During this presentation, you will learn about applications running in containers in a secured manner. We will be presenting the most common attack scenarios and how to prevent and mitigate their impact following the best practices on each layer of the system, from the containers to the orchestrator and compute level as well. Also we will be talking about tools for monitoring your cluster and finally, conducting a discussion about how to approach the architecting of your entire containerized system in the cloud in a secure manner.