Containerized Application Deployments
The adoption of container technology continues to intensify. In fact, Gartner predicts that more than 75% of organizations will use containerized applications by 2022.
As with traditional development environments, when containerized applications incorporate the use of encryption to protect sensitive data and systems, the underlying encryption keys must be secured. The use of hardware security modules (HSMs) to safeguard cryptographic keys is not only a recognized best practice but is often required by compliance mandates.