There will be cases like the serverless compute engine ECS Fargate, Google Cloud Run, etc., where some of these pieces are out of our control, so we work on a shared responsibility model. The provider is responsible for keeping the base pieces working and secured And you can focus on the upper layers. Prevention: 8 steps for shift left security Before your application inside a container is execute
![Container security best practices: Comprehensive guide](https://cdn-ak-scissors.b.st-hatena.com/image/square/9fa52ebfc7853b92b616119d119f4c6cecc471c2/height=288;version=1;width=512/https%3A%2F%2Fsysdig.com%2Fwp-content%2Fuploads%2FContainer-Security-Best-Practices_00.png)