SlideShare a Scribd company logo
Think 2018 / © 2018 IBM Corporation
Skip the Anxiety Attack when Building
Secure Containerized Apps
—
Lewis Evans
Senior Software Engineer,
IBM Container Service Development
Contents
2Think 2018 / © 2018 IBM Corporation
• What is all of this new technology?
Ø containers, microservices, orchestration
• I’m scared to run in the cloud
• How can IBM help me?
Definitions
A standard way to package an application and all
its dependencies so that it can be moved between
environments and run without changes.
Containers work by isolating the differences
between applications inside the container so that
everything outside the container can be
standardized.
Containers
IBM Cloud Container Service | IBM Confidential | ©2017 IBM Corporation
Container Use Cases
Create new cloud-native apps
Streamline development
with built-in microservices, runtimes,
containers and Kubernetes orchestration
plus integrated management.
Modernize your heritage apps on cloud
Move your apps as-is to the cloud or re-
factor an app and use it in new
development and application workload
models.
Open your data center to work with cloud
services
Protect and leverage your in-house data
and pull in external
Allows users to define how to coordinate the
containers in the cloud when the multi-container
packaged application is deployed.
• Scheduling
• Cluster management
• Service discovery
• Provisioning
• Monitoring
• Configuration management
Container Orchestration
An engineering approach focused on decomposing an
application into single-function modules with well
defined interfaces which are independently deployed
and operated by a small team who owns the entire
lifecycle of the service.
Microservices accelerate delivery by minimizing
communication and coordination between people while
reducing the scope and risk of change.
Microservices
Problem
“Over 30% of Official
Images in DockerHub
Contain High Priority
Security Vulnerabilities”
Banyan Ops report
Source: http://bit.ly/2eknhJs
“80% of attacks leverage known
vulnerabilities and configuration
management setting weaknesses”
US State Department report
Source: http://bit.ly/2esbkke
The Heartbleed bug allows anyone on the Internet to read
the memory of the systems protected by the vulnerable
versions of the OpenSSL software. This compromises the
secret keys used to identify the service providers and to
encrypt the traffic, the names and passwords of the users
and the actual content. This allows attackers to eavesdrop
on communications, steal data directly from the services
and users and to impersonate services and users.
Source: http://heartbleed.com
The consequences of an attacker
successfully exploiting this vulnerability
on a Web server are serious in nature.
For example attackers may have the
ability to dump password files or
download malware on to infected
computers. Once inside the victim’s
firewall, the attackers could then
compromise and infect other computers
on the network.
Source: http://symc.ly/2e1blNM
IBM Cloud Container Service | ©2018 IBM Corporation
Sometimes things don’t
go as planned…
Many possibilities for failure
• Failures WILL happen
• Their root causes can be complex and
affect different number of users
• Reduce the likelihood of correlated
failures
• Recover quickly
• Proactive detection of problems before
they happen
Datacenter
Server Rack
Server
Virtual Server
Code
Request
Being competitive
requires:
– Rapid delivery
– Leveraging public cloud
– Simple, rapid scaling
Container and
microservice
considerations:
- Monitoring
- Logging
- Security
- Application versioning
- Root cause analysis
- Persistent storage
- Docker engine management
- Kubernetes version
Skip the anxiety attack when building secure containerized apps
A managed Kubernetes service providing an intuitive user experience
with on-going cluster management. Built-in security and isolation to
enable rapid delivery of apps, while leveraging IBM Cloud Services
including Weather data, IoT, Analytics, or AI capabilities with Watson.
Available in six IBM regions WW, including 19 datacenters.
Kubernetes Certified Service Provider
Kubernetes Technology Partner
Kubernetes Service Providers
IBM Cloud Container Service | ©2018 IBM Corporation
Kubernetes
Capabilities
Intelligent Scheduling Self-healing Horizontal scaling
Service discovery & load balancing Automated rollouts and rollbacks Secret and configuration management
IBM Cloud Container Service | ©2018 IBM Corporation
API
UI
CLI
Kubernetes
Master
Worker Node 1
Worker Node 2
Worker Node 3
Worker Node n
Registry
• Etcd
• API Server
• Controller Manager
Server
• Scheduler Server
Kubernetes Architecture
Cluster
Management
Capabilities
Simplified cluster
management
Extend with
IBM Cloud & Watson
Container security
& isolation
Automated
toolchains
Native open-source
experience
Integrated
operational tools
IBM Cloud Container Service | ©2018 IBM Corporation
• Intuitive graphical user experience
• CLI and API alternatives
• Fully managed master nodes
• User controlled worker node management
Simplified Cluster Management
IBM Cloud Container Service | ©2018 IBM Corporation
• Provides Docker image and running container scanning to
detect vulnerabilities and configuration weaknesses with
Vulnerability Advisor
• Image security enforcement
• Store your images securely in your hosted private registry
• Docker image signing
• Automatic encryption of secrets and volumes
• Isolated networking and storage
Container Security & Isolation
IBM Cloud Container Service | ©2018 IBM Corporation
Design Your Own Cluster
• Tunable capacity
• Select between shared and
dedicated compute
• Edge nodes
• Configurable networking and
storage
• Integrated VPN
IBM Cloud Container Service | ©2018 IBM Corporation
Extend IBM Cloud Services
• Enhance your application with Watson, IoT, Analytics and Data
Services
• Persistent Volumes using IBM Cloud storage
• IP and application Load Balancing
• Integrated with IBM Cloud access management
IBM Cloud Container Service | ©2018 IBM Corporation
Native Kubernetes Experience
• Seamless experience moving from local
development to IBM Bluemix
• 100% Kubernetes API and tools
• Supports Kubernetes dashboard
• Leverage Docker images
IBM Cloud Container Service | ©2018 IBM Corporation
Integrated Operational Tools
• Built-in log and metrics collection with IBM Bluemix
log and metrics services
• Use with IBM DevOps tools such as Delivery Pipeline
• Supports popular add-ons including Prometheus,
Weave, sysdig, fluentd and others
IBM Cloud Container Service | ©2018 IBM Corporation
Hardware level trust in the cloud?
Introducing:
IBM Cloud Container Service
with Trusted Compute
28Think 2018 / DOC ID / Month XX, 2018 / © 2018 IBM Corporation
Image Area
Tamper-proof assurance with a chain of
trust, rooted in hardware
Audit the trusted status of Bare-metal
Kubernetes worker nodes for compliance
needs
Uniquely secure: Containers protection
from the hardware up, available only from
IBM
How IBM delivers IBM Cloud Container Service with Trusted
Compute
Tamper-proof integrity assurance with a chain of trust rooted in hardware with Intel® Trusted Execution
Technology (Intel® TXT)
• Hardware Root of Trust with Intel® TXT
• Chain of Trust & Attestation with Intel Cloud
Integrity Technology (Intel ® CIT)
• Transparent visibility of Integrity assurance
to Kubernetes orchestration
• Container Integrity with Docker Trust
• Audit Logging and Continuous Monitoring
29
Skip the Anxiety Attack When Building
Secure Containerized Apps
Skip the Anxiety Attack When Building
Secure Containerized Apps
• Integrated security insights with Vulnerability Advisor
• Control access to cluster and containerized apps
• Network isolation
• Physical server isolation in the cloud
• Easy development with portable Docker containers
• Fast and scalable deployments with Kubernetes
• Create HA clusters and apps
• Operations support with native tools and 3rd party tools
• Modernize your apps using 170+ services from IBM Cloud
catalog, including Watson, Weather, IoT, or Data
What
do our
users
say?
“easy setup compared to the other cloud services like AWS,
Google cloud and Azure.”
“The biggest factor is that the cluster is managed. The cluster
management of kubernetes is a component with a lot of
learning cost high recognition.”
“Voice Gateway + Watson is used to validate call center
solutions”
“high speed”
“simple to use”
“Its right on the mark in terms of control and also you have a
free option. I am experimenting with blockchain using CS”
“We believe that it is attractive that you can leave the
infrastructure management part of the kubernetes cluster,
verify the safety of containers, and the part of cooperation
with bluemix team.”
Thank you
33Think 2018 / © 2018 IBM Corporation
Lewis Evans
Senior Software Engineer,
IBM Cloud Container Service Development
—
Lewis.evans@uk.ibm.com
Learn more:
ibm.biz/ibm-k8s

More Related Content

PDF
Cloud Security: What you need to know about IBM SmartCloud Security
PPTX
Cloud Security Fundamentals Webinar
PPTX
Kubernetes solutions
PDF
Cloud Security Engineering - Tools and Techniques
PPTX
Authentication cloud
PPT
On technical security issues in cloud computing
PPT
Security Issues of Cloud Computing
PDF
Cloud Computing Security
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security Fundamentals Webinar
Kubernetes solutions
Cloud Security Engineering - Tools and Techniques
Authentication cloud
On technical security issues in cloud computing
Security Issues of Cloud Computing
Cloud Computing Security

What's hot (20)

PDF
The Security and Privacy Threats to Cloud Computing
PPTX
Cloud computing security from single to multiple
PPTX
Cloud Encryption
PDF
Developing Hybrid Cloud Applications
PPTX
Security in cloud computing
PPTX
DevOps on GCP Course Compared to AWS
PPT
Cloud Computing Security Challenges
PPTX
Security in Cloud Computing
PDF
IBM Containers- Bluemix
PPTX
Smart cloud - single to multi cloud
PDF
TechWiseTV Workshop: Intercloud Fabric
PDF
Azure IoT Hub: what is it and why we select other solution (production projec...
PPTX
Cloud security privacy- org
PDF
Cloud computing security
PDF
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
PPTX
Virtualization security for the cloud computing technology
PDF
Evaluation Of The Data Security Methods In Cloud Computing Environments
PPTX
Watson kista summit 2018 icp
PDF
Week 4 lecture material cc (1)
PPTX
Cloud Security
The Security and Privacy Threats to Cloud Computing
Cloud computing security from single to multiple
Cloud Encryption
Developing Hybrid Cloud Applications
Security in cloud computing
DevOps on GCP Course Compared to AWS
Cloud Computing Security Challenges
Security in Cloud Computing
IBM Containers- Bluemix
Smart cloud - single to multi cloud
TechWiseTV Workshop: Intercloud Fabric
Azure IoT Hub: what is it and why we select other solution (production projec...
Cloud security privacy- org
Cloud computing security
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Virtualization security for the cloud computing technology
Evaluation Of The Data Security Methods In Cloud Computing Environments
Watson kista summit 2018 icp
Week 4 lecture material cc (1)
Cloud Security
Ad

Similar to Skip the anxiety attack when building secure containerized apps (20)

PPTX
Istio - A Service Mesh for Microservices as Scale
PDF
Evolve or Fall Behind: Driving Transformation with Containers - Sai Vennam - ...
PDF
IBM Cloud Paris Meetup - 20180628 - IBM Cloud Private
PPT
A Complete Guide Cloud Computing
PDF
Understanding Docker and IBM Bluemix Container Service
PDF
Accelerate Digital Transformation with IBM Cloud Private
PPTX
Mahika cloud services
PDF
L105704 ibm-cloud-private-z-cairo-v1902a
PPTX
Bluemix overview v1.4
PDF
Implementing zero trust in IBM Cloud Pak for Integration
PDF
VietOpenStack meetup 7th Openstack in ibm cloud
PDF
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds (Interconn...
PPTX
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...
PPTX
Cloud computing
PDF
IBM Hybrid Cloud Integration UCC Talk, 23rd November 2021 - Cloud Application...
PDF
Bringing AI to the edge on-premises Azure Cognitive Services using Docker con...
PPTX
CLOUD COMPUTING In Brief UNIT I PPT.pptx
PPTX
BT Cloud Enterprise Service Store - Rob Rowlingson
PPT
IBM Cloud UCC Talk, 8th December 2020 - Cloud Native, Microservices, and Serv...
PPTX
Beginners Guide and general overview to Cloud Computing.pptx
Istio - A Service Mesh for Microservices as Scale
Evolve or Fall Behind: Driving Transformation with Containers - Sai Vennam - ...
IBM Cloud Paris Meetup - 20180628 - IBM Cloud Private
A Complete Guide Cloud Computing
Understanding Docker and IBM Bluemix Container Service
Accelerate Digital Transformation with IBM Cloud Private
Mahika cloud services
L105704 ibm-cloud-private-z-cairo-v1902a
Bluemix overview v1.4
Implementing zero trust in IBM Cloud Pak for Integration
VietOpenStack meetup 7th Openstack in ibm cloud
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds (Interconn...
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...
Cloud computing
IBM Hybrid Cloud Integration UCC Talk, 23rd November 2021 - Cloud Application...
Bringing AI to the edge on-premises Azure Cognitive Services using Docker con...
CLOUD COMPUTING In Brief UNIT I PPT.pptx
BT Cloud Enterprise Service Store - Rob Rowlingson
IBM Cloud UCC Talk, 8th December 2020 - Cloud Native, Microservices, and Serv...
Beginners Guide and general overview to Cloud Computing.pptx
Ad

More from Haidee McMahon (8)

PDF
Edge Computing and 5G - SDN/NFV London meetup
PDF
Ligato - A platform for development of Cloud-Native VNF's - SDN/NFV London me...
PPTX
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
PDF
Introduction to container networking in K8s - SDN/NFV London meetup
PDF
Introduction to Intel's Developer Program
PDF
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
PDF
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
PPTX
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Edge Computing and 5G - SDN/NFV London meetup
Ligato - A platform for development of Cloud-Native VNF's - SDN/NFV London me...
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to Intel's Developer Program
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...
Intel's Out of the Box Network Developers Ireland Meetup on March 29 2017 - ...

Recently uploaded (20)

PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
medical staffing services at VALiNTRY
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
ai tools demonstartion for schools and inter college
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Nekopoi APK 2025 free lastest update
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Understanding Forklifts - TECH EHS Solution
PDF
System and Network Administration Chapter 2
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Transform Your Business with a Software ERP System
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PTS Company Brochure 2025 (1).pdf.......
medical staffing services at VALiNTRY
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
ai tools demonstartion for schools and inter college
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Nekopoi APK 2025 free lastest update
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Understanding Forklifts - TECH EHS Solution
System and Network Administration Chapter 2
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
How Creative Agencies Leverage Project Management Software.pdf
How to Choose the Right IT Partner for Your Business in Malaysia
Transform Your Business with a Software ERP System
Which alternative to Crystal Reports is best for small or large businesses.pdf
Reimagine Home Health with the Power of Agentic AI​
Navsoft: AI-Powered Business Solutions & Custom Software Development

Skip the anxiety attack when building secure containerized apps

  • 1. Think 2018 / © 2018 IBM Corporation Skip the Anxiety Attack when Building Secure Containerized Apps — Lewis Evans Senior Software Engineer, IBM Container Service Development
  • 2. Contents 2Think 2018 / © 2018 IBM Corporation • What is all of this new technology? Ø containers, microservices, orchestration • I’m scared to run in the cloud • How can IBM help me?
  • 4. A standard way to package an application and all its dependencies so that it can be moved between environments and run without changes. Containers work by isolating the differences between applications inside the container so that everything outside the container can be standardized. Containers
  • 5. IBM Cloud Container Service | IBM Confidential | ©2017 IBM Corporation Container Use Cases Create new cloud-native apps Streamline development with built-in microservices, runtimes, containers and Kubernetes orchestration plus integrated management. Modernize your heritage apps on cloud Move your apps as-is to the cloud or re- factor an app and use it in new development and application workload models. Open your data center to work with cloud services Protect and leverage your in-house data and pull in external
  • 6. Allows users to define how to coordinate the containers in the cloud when the multi-container packaged application is deployed. • Scheduling • Cluster management • Service discovery • Provisioning • Monitoring • Configuration management Container Orchestration
  • 7. An engineering approach focused on decomposing an application into single-function modules with well defined interfaces which are independently deployed and operated by a small team who owns the entire lifecycle of the service. Microservices accelerate delivery by minimizing communication and coordination between people while reducing the scope and risk of change. Microservices
  • 9. “Over 30% of Official Images in DockerHub Contain High Priority Security Vulnerabilities” Banyan Ops report Source: http://bit.ly/2eknhJs “80% of attacks leverage known vulnerabilities and configuration management setting weaknesses” US State Department report Source: http://bit.ly/2esbkke The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users. Source: http://heartbleed.com The consequences of an attacker successfully exploiting this vulnerability on a Web server are serious in nature. For example attackers may have the ability to dump password files or download malware on to infected computers. Once inside the victim’s firewall, the attackers could then compromise and infect other computers on the network. Source: http://symc.ly/2e1blNM IBM Cloud Container Service | ©2018 IBM Corporation
  • 11. Many possibilities for failure • Failures WILL happen • Their root causes can be complex and affect different number of users • Reduce the likelihood of correlated failures • Recover quickly • Proactive detection of problems before they happen Datacenter Server Rack Server Virtual Server Code Request
  • 12. Being competitive requires: – Rapid delivery – Leveraging public cloud – Simple, rapid scaling
  • 13. Container and microservice considerations: - Monitoring - Logging - Security - Application versioning - Root cause analysis - Persistent storage - Docker engine management - Kubernetes version
  • 15. A managed Kubernetes service providing an intuitive user experience with on-going cluster management. Built-in security and isolation to enable rapid delivery of apps, while leveraging IBM Cloud Services including Weather data, IoT, Analytics, or AI capabilities with Watson. Available in six IBM regions WW, including 19 datacenters. Kubernetes Certified Service Provider Kubernetes Technology Partner Kubernetes Service Providers IBM Cloud Container Service | ©2018 IBM Corporation
  • 17. Intelligent Scheduling Self-healing Horizontal scaling Service discovery & load balancing Automated rollouts and rollbacks Secret and configuration management IBM Cloud Container Service | ©2018 IBM Corporation
  • 18. API UI CLI Kubernetes Master Worker Node 1 Worker Node 2 Worker Node 3 Worker Node n Registry • Etcd • API Server • Controller Manager Server • Scheduler Server Kubernetes Architecture
  • 20. Simplified cluster management Extend with IBM Cloud & Watson Container security & isolation Automated toolchains Native open-source experience Integrated operational tools IBM Cloud Container Service | ©2018 IBM Corporation
  • 21. • Intuitive graphical user experience • CLI and API alternatives • Fully managed master nodes • User controlled worker node management Simplified Cluster Management IBM Cloud Container Service | ©2018 IBM Corporation
  • 22. • Provides Docker image and running container scanning to detect vulnerabilities and configuration weaknesses with Vulnerability Advisor • Image security enforcement • Store your images securely in your hosted private registry • Docker image signing • Automatic encryption of secrets and volumes • Isolated networking and storage Container Security & Isolation IBM Cloud Container Service | ©2018 IBM Corporation
  • 23. Design Your Own Cluster • Tunable capacity • Select between shared and dedicated compute • Edge nodes • Configurable networking and storage • Integrated VPN IBM Cloud Container Service | ©2018 IBM Corporation
  • 24. Extend IBM Cloud Services • Enhance your application with Watson, IoT, Analytics and Data Services • Persistent Volumes using IBM Cloud storage • IP and application Load Balancing • Integrated with IBM Cloud access management IBM Cloud Container Service | ©2018 IBM Corporation
  • 25. Native Kubernetes Experience • Seamless experience moving from local development to IBM Bluemix • 100% Kubernetes API and tools • Supports Kubernetes dashboard • Leverage Docker images IBM Cloud Container Service | ©2018 IBM Corporation
  • 26. Integrated Operational Tools • Built-in log and metrics collection with IBM Bluemix log and metrics services • Use with IBM DevOps tools such as Delivery Pipeline • Supports popular add-ons including Prometheus, Weave, sysdig, fluentd and others IBM Cloud Container Service | ©2018 IBM Corporation
  • 27. Hardware level trust in the cloud?
  • 28. Introducing: IBM Cloud Container Service with Trusted Compute 28Think 2018 / DOC ID / Month XX, 2018 / © 2018 IBM Corporation Image Area Tamper-proof assurance with a chain of trust, rooted in hardware Audit the trusted status of Bare-metal Kubernetes worker nodes for compliance needs Uniquely secure: Containers protection from the hardware up, available only from IBM
  • 29. How IBM delivers IBM Cloud Container Service with Trusted Compute Tamper-proof integrity assurance with a chain of trust rooted in hardware with Intel® Trusted Execution Technology (Intel® TXT) • Hardware Root of Trust with Intel® TXT • Chain of Trust & Attestation with Intel Cloud Integrity Technology (Intel ® CIT) • Transparent visibility of Integrity assurance to Kubernetes orchestration • Container Integrity with Docker Trust • Audit Logging and Continuous Monitoring 29
  • 30. Skip the Anxiety Attack When Building Secure Containerized Apps
  • 31. Skip the Anxiety Attack When Building Secure Containerized Apps • Integrated security insights with Vulnerability Advisor • Control access to cluster and containerized apps • Network isolation • Physical server isolation in the cloud • Easy development with portable Docker containers • Fast and scalable deployments with Kubernetes • Create HA clusters and apps • Operations support with native tools and 3rd party tools • Modernize your apps using 170+ services from IBM Cloud catalog, including Watson, Weather, IoT, or Data
  • 32. What do our users say? “easy setup compared to the other cloud services like AWS, Google cloud and Azure.” “The biggest factor is that the cluster is managed. The cluster management of kubernetes is a component with a lot of learning cost high recognition.” “Voice Gateway + Watson is used to validate call center solutions” “high speed” “simple to use” “Its right on the mark in terms of control and also you have a free option. I am experimenting with blockchain using CS” “We believe that it is attractive that you can leave the infrastructure management part of the kubernetes cluster, verify the safety of containers, and the part of cooperation with bluemix team.”
  • 33. Thank you 33Think 2018 / © 2018 IBM Corporation Lewis Evans Senior Software Engineer, IBM Cloud Container Service Development — Lewis.evans@uk.ibm.com Learn more: ibm.biz/ibm-k8s