Containerization revolutionizes software deployment by packaging applications and their dependencies into portable, isolated units called containers. In fact, according to Enterprise Strategy Group research, 77% of organizations state they support eleven to more than twenty containers per hosts in their environments. When applied to embedded systems, this technology streamlines resource-efficient deployment, enabling seamless application management across diverse devices. Deployment of containers into embedded platforms comes with security risks and attacks including remote code executions, man-in-the-middle attacks, and privilege escalation. Thwarting these types of attacks necessitates meticulous attention to developer practices and deployment strategies to ensure comprehensive container security.
What you will learn:
• Fundamentals of containers and their adoption on embedded systems
• Security risks surrounding embedded container technology
• Tips for securing containers from development to deployment on embedded systems