Read the original article: blog | Using container technology to make a trusted pipeline
In our last post we talked about using Multi-Category Security (MCS) instead of Multi-Level Security (MLS) to provide isolation on systems with different levels of sensitivity. In this post we’ll cover creating a trusted pipeline via containers.
Read the original article: blog | Using container technology to make a trusted pipeline