Latest from Embedded

Dreamstime_Monsit-Jangariyawong_117103442
dreamstime_monsitjangariyawong_117103442
Tony Vitolo/Electronic Design
promo1920x1080
ID 83317721 © Igor Zakharevich | Dreamstime.com
supplychain_dreamstime_l_83317721
ID 144516710 © vladimir timofeev | Dreamstime.com
Data Center
ID 5549870 © Artistar | Dreamstime.com
hard_drive_dreamstime_l_5549870
Dreamstime_Funtap-P_131525868
Security Dreamstime Funtap P 131525868 6351508e75dfb

What’s the Difference in Security Between Virtual Machines and Containers? (Download)

Oct. 20, 2022

Read this article online.

Hardware virtualization using virtual machines (VMs) has several use cases in embedded systems, ranging from workload consolidation to running applications on legacy operating systems. Operating-system virtualization utilizing containers opens up an additional use case for enabling a DevSecOps (development, security, and operations) environment by packaging an application’s dependencies with the application. Many differences exist between VMs and containers in performance, scalability, and portability, but this article will focus on security.

All types of virtualization provide a basis for security with a goal of isolating software running in a VM or container from other VMs and containers. Different types of virtualization solutions achieve isolation to varying degrees, and how tightly the isolation function is coupled to the virtualization function also can impact security.