\abstractenglish{ % skip indentation just for this paragraph \textenglish{ \noindent Today, more and more people rely on IaaS services over traditional on-premise infrastructure to provide operational support to applications, services and business processes. This is because in this way this way, the costs of an organization or business are reduced as long as there is no need expenditure/investment on the purchase of equipment and the operational costs of using services IaaS is based on flexible billing models based on usage (of infrastructure resources that offered). In addition, it is possible to scale the offered remote infrastructure depending on the needs of the organisation and the current workload of the services and applications to be supported. In this way, the responsibility for and maintenance of the equipment to third parties while at the same time introducing a new model of trust between the user/organisation and the cloud provider. The increase interest by enterprises in virtualisation technologies which are a key the foundation of IaaS services, but also the rapid rise in popularity of technologies container technologies such as Docker has in turn begun to drive the adoption of the architectural microservices architecture for application development. An architecture based on both on virtualization technologies for housing applications in cloud infrastructures and container technologies for partitioning their functions, providing a an appropriate level of performance and scalability \footfullcite{awsMicroservices}. However, they remain directly addressable. security issues that may affect the cloud itself and/or the technologies on which it is based. } \clearpage \textenglish{ In this paper we will first analyse the security issues related to the cloud and in particular those related to virtualization and container technologies. Then, we will analyze how these 2 technologies can be used with more safety security. But the purpose of the paper goes beyond that and moves to a practical level, proposing the solution of a tool that can implement in this way the proposed safe use of these technologies. In particular, this tool does not not only can create virtual machines across multiple cloud providers but also harden them in an automated manner. In addition, it is capable of installing these virtual machines the Docker container machine, which it can also harden. The main goal of the work is to make it easier for an organization to install and configure in an automated manner a secure, distributed environment (pro- host and operation) for the deployment and operation of a microservices application. This automation lies in the correct configuration of the tool, which does not require and does not require any special knowledge of technical or security issues. infrastructure and operating systems. } \vskip 60pt \textenglish{ \noindent \textbf{Keywords:} Cloud, Security, Virtualization, Containers, Micro-services, Automation } } \clearpage % Abstract ended, start a new page