Sandboxing and Workload Isolation
The text discusses various isolation techniques used in workload security, including chroot, privilege separation, prelapsarian containers, incarceration, language runtimes, emulation, lightweight virtualization, and Firecracker. It highlights the pros and cons of each technique and emphasizes that network exposure is a crucial factor to consider when implementing these methods. The author suggests that jails, unprivileged Docker containers, gVisor, and Firecracker are valid options for workload isolation, with the choice depending on specific requirements and constraints.
Company
Fly.io
Date published
July 29, 2020
Author(s)
Thomas Ptacek
Word count
2859
Language
English
Hacker News points
158