Latest from Embedded

ID 88963268 © Jurij Boiko | Dreamstime.com
pcb_dreamstime_l_88963268
ID 395369077 © BiancoBlue | Dreamstime.com
virtualreality_dreamstime_xl_395369077
ID 144516710 © vladimir timofeev | Dreamstime.com
Data Center
Dreamstime_Funtap-P_131525868
Security Dreamstime Funtap P 131525868 6351508e75dfb

What’s the Difference in Security Between Virtual Machines and Containers? (Download)

Oct. 20, 2022

Read this article online.

Hardware virtualization using virtual machines (VMs) has several use cases in embedded systems, ranging from workload consolidation to running applications on legacy operating systems. Operating-system virtualization utilizing containers opens up an additional use case for enabling a DevSecOps (development, security, and operations) environment by packaging an application’s dependencies with the application. Many differences exist between VMs and containers in performance, scalability, and portability, but this article will focus on security.

All types of virtualization provide a basis for security with a goal of isolating software running in a VM or container from other VMs and containers. Different types of virtualization solutions achieve isolation to varying degrees, and how tightly the isolation function is coupled to the virtualization function also can impact security.