Abstract: Systems, methods, and software described herein provide encryption configurations for secure application containers. In one example, a method of operating a management system to provide encryption configurations to secure application containers includes identifying an encryption configuration from a plurality of encryption configurations for an application container. The method further includes transferring the encryption configuration to the application container, wherein the encryption configuration configures a security layer in the application container to act as an encryption intermediary between an application in the application container and processes external to the application container.
Abstract: Systems, methods, and software described herein provide encryption configurations to application containers. In one example, a method of operating a management system to provide VPN configurations to application containers in an application container environment includes identifying two application containers in the application container environment for secure communication, and identifying a VPN configuration for the two application containers. The method further includes configuring the two application containers for secure communication by transferring the VPN configuration to security layers within each of the two application containers.