Container Security Challenges
Container Security Challenges
Table of Contents
2
Containers: Security Challenges and How to Address Them
Containers recently exploded onto the IT scene, but they aren’t truly new.
The concept of containers has existed for years within Linux, but Docker and
the rise of DevOps have propelled containers from obscure technology to
mainstream acceptance to business imperative in a matter of just a few short
years.
3
Containers: Security Challenges and How to Address Them
Years virtual machines whose lives can extend to years. It is not unheard of to have
software running on system that are even decades old. Shorter patch cycles
Virtual Machine Life
can reduce security risks that stem from unpatched, unmaintained, and
unsupported software.”
While the sharing of the host operating system kernel is one of the primary
benefits of containers, it is also the crux of the problem when it comes to
security concerns with containers. The lack of proper isolation between
containers and the kernel during runtime means that a vulnerability that
exists in the shared OS kernel can be leveraged to gain access to or exploit
the containers.
4
Containers: Security Challenges and How to Address Them
Fine stresses, “Containers provide abstraction at the kernel level rather than
the hardware level that virtual machines provide. The concern as it relates to
containers is that a compromised kernel can enable unwanted access to all
the containers running on a particular container hosts.”
It is difficult to project how container breaches will scale when the public
record of successful breaches is sparse or nonexistent, but all the right
elements for catastrophe are there. “Modern application container software,
5
Containers: Security Challenges and How to Address Them
which is not yet even 3 years old, still has some immaturity challenges,
including software bugs and vulnerabilities,” says Jay Lyman, Research
Manager for Cloud Management and Containers at 451 Research.
With early detection as a foundational goal, there are three driving principles
for protecting your container environments.
3. Use active response. Detecting issues is only half the battle. You also
need tools and processes in place that enable you to actively respond. You
need to stop malicious activity wherever possible and mitigate issues to limit
damage elsewhere.
Amir Jerbi, CTO at Aqua Security, strongly emphasizes the need for active
monitoring and response as opposed to relying solely on preventive
measures like vulnerability management or host hardening. “The analogy is
like thinking that your apartment is safe because you locked the door and
shut the windows, without using home monitoring or an alarm system – but
unlike a burglary, IT security breaches can go undetected for months without
proper monitoring,” cautions Jerbi.
6
Container Security
Made Simple
Aqua Security helps you navigate the complex world of containers with a
platform that automates and simplifies application security in containerized
environments, whether on-premises or in the cloud.
7
Scale and ship your app faster: apply your knowledge today
Now that you've learned how to use containers securely, why not put your
knowledge into action? See firsthand how containers can support faster
software delivery and help your team accomplish more with your valuable time
and resources.
Microsoft has created a free, hands-on, virtual lab that walks you through the
Build your first container basics of installing, deploying and managing a Docker container. You’ll also
using Docker on Hyper-V learn the fundamentals of incorporating Docker on Hyper-V into your current
development plans.
Free, hands-on virtual lab
Now that you've learned how to use containers securely, why not put your
knowledge into action? See firsthand how containers can support faster
software delivery and help your team accomplish more with your valuable time
and resources.
Microsoft has created a free, hands-on, virtual lab that walks you through the
Build your first container basics of installing, deploying and managing a Docker container. You’ll also
using Docker on Hyper-V learn the fundamentals of incorporating Docker on Hyper-V into your current
development plans.
Free, hands-on virtual lab
It’s an easy way to get started with containers – and there’s no setup or
No download or
installation required installation required. In less than an hour, you can build, deploy and manage
your first container.
Visit aka.ms/trycontainers
Start your free training today.
8
Containers: Security Challenges and How to Address Them
9
Containers: Security Challenges and How to Address Them
event needs to Jerbi clarifies the importance of monitoring beyond initial development,
automatically flag though, and also being able to quickly identify which containers in your
that you have environment are affected by new vulnerabilities. “Say you have scanned and
approved an image as being free of vulnerabilities. When a new vulnerability
containers running is discovered in packages used in images you’ve deployed, that event needs
that are based on to automatically flag that you have containers running that are based on that
that image and image and prompt you to update or patch the code.”
prompt you to 2. Scan for vulnerabilities before pushing images to the registry. As a
update or patch final check once container development is complete, you should perform a
the code.” vulnerability scan on containers before pushing the images to the registry.
— Amir Jerbi 3. Continue scanning in the registry. New vulnerabilities are discovered
CTO, all the time, so scanning for and identifying vulnerabilities is a continuous
Aqua Security process. You should continue to scan container images in the registry both
to identify any flaws that were somehow missed during development and
to address any newly discovered vulnerabilities that might exist in the code
used in the container images.
5. Ensure that only approved images are used in your environment. There
is enough change and volatility in a container ecosystem without allowing
unknown containers as well. You should prohibit the use of unapproved
container images, and have tools and processes in place to monitor for and
prevent the use of unapproved container images.
10
Containers: Security Challenges and How to Address Them
11
Containers: Security Challenges and How to Address Them
12. Monitor container activity and user access. Just as with any IT
environment, you should consistently monitor activity and user access to
your container ecosystem to quickly identify any suspicious or malicious
activity.
14. Log all container administrative user access for auditing. Maintain an
accurate audit trail of administrative access to your container ecosystem,
container registry, and container images. These logs may be necessary for
auditing purposes, and will be useful as forensic evidence in the wake of any
security incident.
12
Containers: Security Challenges and How to Address Them
45% effectively, but part of using containers effectively is to understand the risks
involved and take steps to ensure you’re using containers securely.
Are Able to Release
Apps Faster
Use the information in this paper and follow the steps outlined to secure your
containerized applications so you can adopt containers with confidence and
manage your container environment with some peace of mind.
ABOUT THE AUTHOR: Tony is a respected authority on technology. He has authored or co-authored a number of
books, including Unified Communications for Dummies, Essential Computer Security, and PCI Compliance. Tony’s
work has appeared in PCWorld, CSO Online, Forbes, TechRepublic, and other print and online media sources.
13