Secure Container-based Architectures with Centrify

Secure Containers

Establish Secure DevOps for Container-Based Architectures

Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security. A research study by Gartner (DevSecOps: How to Seamlessly Integrate Security into DevOps) shows that fewer than 20% of enterprise security teams have engaged with their DevOps groups to actively and systematically incorporate information security into their DevOps initiatives. For example, one of the key capabilities of these technologies – the ability to start up and power down almost instantly – has created a significant security challenge for enterprises.

While microservices and containers provide significant benefits, they also introduce unique new risks. As is usually the case with emerging technologies, microservices and containers were not inherently architected with security in mind. In most organizations, they are not yet covered under the enterprise security plan. Since they are likely already deployed somewhere within the organization, these technologies should be considered as part of the attack surface that needs to be protected.


Centrify Zero Trust Privilege solutions are tailored to meet the needs of the ever-expanding threatscape. With Centrify, the same host-based security you use on-premises can be similarly leveraged for containerized applications. You get the continual benefits of centralized management and consistent security across your data center and cloud-based virtual instances, containers and microservices.

With Centrify you can secure container architectures to:

  • Centrally manage user access rights and privileges to Linux Docker hosts, including hosts running CoreOS Container Linux.
  • Implement multi-factor authentication (MFA) and temporary privilege escalation to gain access to individual containers and container hosts.
  • Enable granular privilege management at the container platform and the container operating system layers across your development environments.

Learn more about how Centrify can secure your DevOps environment.

Learn More About Centrify PAM

Ready to Protect Against the #1 Attack Vector?

Click here for more information about our products, pricing, demos, and more.

Contact Us