{"id":256,"date":"2022-03-03T19:44:01","date_gmt":"2022-03-03T19:44:01","guid":{"rendered":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/?p=256"},"modified":"2023-04-25T19:30:10","modified_gmt":"2023-04-25T19:30:10","slug":"11-recommended-security-practices-to-manage-the-container-lifecycle","status":"publish","type":"post","link":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/","title":{"rendered":"11 Recommended Security Practices to Manage the Container Lifecycle"},"content":{"rendered":"<p>Most organizations today are on a path to modernize the way they build and deliver applications and services\u2014with profound benefits. Application packaging, specifically containerization, plays a key role in this modernization.<\/p>\n<p>This brochure covers Presidio and VMware&#8217;s 11 recommended security practices, each highlighting the various stages of a container\u2019s lifecycle. You\u2019ll learn:<\/p>\n<ul>\n<li>How each application is built, stored, deployed, and run<\/li>\n<li>Recommended best practices for DevSecOps teams looking to move to a more modern application lifecycle methodology<\/li>\n<li>How DevSecOps can improve how they think about and practice security, governance and compliance\u2014 and instill confidence in faster release cycles<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Most organizations today are on a path to modernize the way they build and deliver applications and services\u2014with profound benefits. Application packaging, specifically containerization, plays a key role in this modernization. This brochure covers Presidio and VMware&#8217;s 11 recommended security practices, each highlighting the various stages of a container\u2019s lifecycle. You\u2019ll learn: How each application [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":590,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"class_list":["post-256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","types-white-paper"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>11 Recommended Security Practices to Manage the Container Lifecycle | Presidio + VMware<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"11 Recommended Security Practices to Manage the Container Lifecycle | Presidio + VMware\" \/>\n<meta property=\"og:description\" content=\"Most organizations today are on a path to modernize the way they build and deliver applications and services\u2014with profound benefits. Application packaging, specifically containerization, plays a key role in this modernization. This brochure covers Presidio and VMware&#8217;s 11 recommended security practices, each highlighting the various stages of a container\u2019s lifecycle. You\u2019ll learn: How each application [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/\" \/>\n<meta property=\"og:site_name\" content=\"Presidio + VMware\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-03T19:44:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-25T19:30:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-content\/uploads\/2022\/03\/Second_Pillar_App_Mod_WP_11_Reco_Security_500x290.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"290\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Heather Morris\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Heather Morris\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/\"},\"author\":{\"name\":\"Heather Morris\",\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/#\/schema\/person\/fee53f8362f2c3817d8094efcf2b6a6e\"},\"headline\":\"11 Recommended Security Practices to Manage the Container Lifecycle\",\"datePublished\":\"2022-03-03T19:44:01+00:00\",\"dateModified\":\"2023-04-25T19:30:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/\"},\"wordCount\":109,\"image\":{\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-content\/uploads\/2022\/03\/Second_Pillar_App_Mod_WP_11_Reco_Security_500x290.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/\",\"url\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/\",\"name\":\"11 Recommended Security Practices to Manage the Container Lifecycle | Presidio + VMware\",\"isPartOf\":{\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-content\/uploads\/2022\/03\/Second_Pillar_App_Mod_WP_11_Reco_Security_500x290.png\",\"datePublished\":\"2022-03-03T19:44:01+00:00\",\"dateModified\":\"2023-04-25T19:30:10+00:00\",\"author\":{\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/#\/schema\/person\/fee53f8362f2c3817d8094efcf2b6a6e\"},\"breadcrumb\":{\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#primaryimage\",\"url\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-content\/uploads\/2022\/03\/Second_Pillar_App_Mod_WP_11_Reco_Security_500x290.png\",\"contentUrl\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-content\/uploads\/2022\/03\/Second_Pillar_App_Mod_WP_11_Reco_Security_500x290.png\",\"width\":500,\"height\":290,\"caption\":\"11 Recommended Security Practices thumbnail\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"11 Recommended Security Practices to Manage the Container Lifecycle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/#website\",\"url\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/\",\"name\":\"Presidio + VMware\",\"description\":\"Presidio Big Cloud\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/#\/schema\/person\/fee53f8362f2c3817d8094efcf2b6a6e\",\"name\":\"Heather Morris\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d33fe7248937b75f27fe6f52080468d6182b9dd202f989219ccdcf11a9f2c4b3?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33fe7248937b75f27fe6f52080468d6182b9dd202f989219ccdcf11a9f2c4b3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33fe7248937b75f27fe6f52080468d6182b9dd202f989219ccdcf11a9f2c4b3?s=96&d=mm&r=g\",\"caption\":\"Heather Morris\"},\"url\":\"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/author\/heathermahalodigital-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"11 Recommended Security Practices to Manage the Container Lifecycle | Presidio + VMware","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"11 Recommended Security Practices to Manage the Container Lifecycle | Presidio + VMware","og_description":"Most organizations today are on a path to modernize the way they build and deliver applications and services\u2014with profound benefits. Application packaging, specifically containerization, plays a key role in this modernization. This brochure covers Presidio and VMware&#8217;s 11 recommended security practices, each highlighting the various stages of a container\u2019s lifecycle. You\u2019ll learn: How each application [&hellip;]","og_url":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/","og_site_name":"Presidio + VMware","article_published_time":"2022-03-03T19:44:01+00:00","article_modified_time":"2023-04-25T19:30:10+00:00","og_image":[{"width":500,"height":290,"url":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-content\/uploads\/2022\/03\/Second_Pillar_App_Mod_WP_11_Reco_Security_500x290.png","type":"image\/png"}],"author":"Heather Morris","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Heather Morris","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#article","isPartOf":{"@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/"},"author":{"name":"Heather Morris","@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/#\/schema\/person\/fee53f8362f2c3817d8094efcf2b6a6e"},"headline":"11 Recommended Security Practices to Manage the Container Lifecycle","datePublished":"2022-03-03T19:44:01+00:00","dateModified":"2023-04-25T19:30:10+00:00","mainEntityOfPage":{"@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/"},"wordCount":109,"image":{"@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#primaryimage"},"thumbnailUrl":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-content\/uploads\/2022\/03\/Second_Pillar_App_Mod_WP_11_Reco_Security_500x290.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/","url":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/","name":"11 Recommended Security Practices to Manage the Container Lifecycle | Presidio + VMware","isPartOf":{"@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/#website"},"primaryImageOfPage":{"@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#primaryimage"},"image":{"@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#primaryimage"},"thumbnailUrl":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-content\/uploads\/2022\/03\/Second_Pillar_App_Mod_WP_11_Reco_Security_500x290.png","datePublished":"2022-03-03T19:44:01+00:00","dateModified":"2023-04-25T19:30:10+00:00","author":{"@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/#\/schema\/person\/fee53f8362f2c3817d8094efcf2b6a6e"},"breadcrumb":{"@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#primaryimage","url":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-content\/uploads\/2022\/03\/Second_Pillar_App_Mod_WP_11_Reco_Security_500x290.png","contentUrl":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-content\/uploads\/2022\/03\/Second_Pillar_App_Mod_WP_11_Reco_Security_500x290.png","width":500,"height":290,"caption":"11 Recommended Security Practices thumbnail"},{"@type":"BreadcrumbList","@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/uncategorized\/11-recommended-security-practices-to-manage-the-container-lifecycle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/"},{"@type":"ListItem","position":2,"name":"11 Recommended Security Practices to Manage the Container Lifecycle"}]},{"@type":"WebSite","@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/#website","url":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/","name":"Presidio + VMware","description":"Presidio Big Cloud","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/#\/schema\/person\/fee53f8362f2c3817d8094efcf2b6a6e","name":"Heather Morris","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d33fe7248937b75f27fe6f52080468d6182b9dd202f989219ccdcf11a9f2c4b3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d33fe7248937b75f27fe6f52080468d6182b9dd202f989219ccdcf11a9f2c4b3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33fe7248937b75f27fe6f52080468d6182b9dd202f989219ccdcf11a9f2c4b3?s=96&d=mm&r=g","caption":"Heather Morris"},"url":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/home\/author\/heathermahalodigital-com\/"}]}},"_links":{"self":[{"href":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-json\/wp\/v2\/posts\/256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-json\/wp\/v2\/comments?post=256"}],"version-history":[{"count":0,"href":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-json\/wp\/v2\/posts\/256\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-json\/wp\/v2\/media\/590"}],"wp:attachment":[{"href":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-json\/wp\/v2\/media?parent=256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/share.mahalodigital.com\/Presidio-VMware-Transformation-Island\/wp-json\/wp\/v2\/categories?post=256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}