Survey
Survey
Abstract—With the rapid adoption of containerized envi- the security risks present in the software supply chain by
ronments for application deployment, ensuring the security of analyzing Software Bill of Materials (SBOMs) from Docker
Docker images has become increasingly critical. The emergence images and open-source repositories. The authors focused on
of DevSecOps, an extension of DevOps that integrates security
into every stage of the software development lifecycle, has led to scanning 1,151 SBOMs, utilizing tools like Trivy and Grype
the creation of numerous methods and tools aimed at detecting for vulnerability detection. Trivy identified a significantly
vulnerabilities in Docker images. This survey delves into the higher number of vulnerabilities (309,022) compared to Grype
latest approaches, technologies, and tools used for automated (43,553), highlighting discrepancies between tools and their
vulnerability detection in Docker images, with a focus on static ability to detect vulnerabilities across various layers. The
and dynamic analysis, CI/CD pipeline integration, and compli-
ance checks. The paper further identifies existing gaps in the study emphasizes the importance of consistency in vulnera-
research and proposes potential future directions, emphasizing bility detection tools, especially when dealing with complex
the need for improved tool interoperability, AI-driven analytics, dependency trees found in Docker images.
and scalable security solutions in the context of DevSecOps. Technologies Used:
Index Terms—Docker, vulnerabilities, DevSecOps, container
• Trivy v0.44.1 and Grype v0.53.1 for vulnerability scanning
security, CI/CD pipelines, automated vulnerability detection.
• Public databases such as CVE and GHSA for vulnerability
I. I NTRODUCTION matching
Limitations:
The widespread adoption of container technologies such
• Inconsistencies between different vulnerability detection
as Docker has dramatically transformed the way applications
are deployed and managed, offering significant advantages tools lead to diverging reports.
• The risk of missing vulnerabilities in transitive dependen-
in scalability, flexibility, and resource optimization. However,
this transition has also introduced unique security challenges, cies, which could go undetected.
particularly with respect to Docker images, which serve as the B. Design and Practice of Security Architecture via De-
foundation for containerized environments. To address these vSecOps Technology This research explores the integration
security challenges, DevSecOps integrates security practices of security architecture within DevSecOps, focusing on cloud-
directly into the software development and deployment pro- native technologies like Docker and Kubernetes. It proposes
cess. This paper presents a comprehensive review of existing a ten-phase cycle for ensuring security, including threat mod-
literature on the detection of vulnerabilities in Docker images, eling, runtime protection, and vulnerability identification. By
highlighting current tools, methodologies, and best practices adopting this comprehensive approach, the study reports im-
for securing containerized environments. The objective is proved deployment times and fewer production bugs. However,
to provide a detailed overview of the latest research while it also identifies runtime risks, such as container escape
identifying critical gaps and proposing avenues for future vulnerabilities, and the increased resource overhead associated
advancements. with monitoring and securing containerized environments.
Technologies Used:
II. R EVIEWED S TUDIES AND F INDINGS • Docker and Kubernetes for container orchestration
A. Assessing Security Risks of Software Supply Chains • DevSecOps security architecture model
Kernel (v4.19.35) and Docker v20.10.17. based on Common Vulnerability Scoring System (CVSS).
• Dataset: 31 released kernel CVEs out of which eight belong • Analysis: Inactive deep scanning of the OS and Docker
to privilege escalation class such as CVE-2017-5123 and image package information.
CVE-2021-42008 and one belongs to speculative execution. • Deployment Environment: Currently only gets tested on an
• Protection Mechanisms: Page Fault Exception Handling: x86 64 CentOS 7 system with DIVDS modules deployed.
Switching the way to obtain kernel permission data to TEE Limitations:
• Pointer Protection: Permission pointers encoded as ad- • Static Analysis Only: Similar to M2D2, DIVDS relies
dresses holding real data. mainly on static analysis (with the help of the Clair tool),
• Polling Mechanism: Scheduling routines checks for certain which makes it ineffective when it comes to runtime devi-
icons or pointers associated with permissions to see if they ations.
have being manipulated. • Whitelist Feature: In specific cases, identified vulnerabilities
Limitations: can be excluded from consideration if they are in the
• Performance Overhead: While still reasonably performant, whitelist, which is inadmissible in critical security assess-
general container startup time is 5-9% longer and workloads ment.
suffer up to 8% additional overhead. • Threshold Dependency: There is flexibility in the user-
• Complexity in Kernel Modifications: Kernel data of various defined threshold scores that may cause changes to the
types must be guarded and for this, one has to inject into computed vulnerability level and reliability.
various and often remote kernel functions – an approach • Performance Overhead: The steps that are going to be added
that is far from being safe. to improve the vulnerability detection and evaluation mech-
• Focused Scope: Condo only discusses non-control flow data anisms might slightly affect the Docker image processing
attack while other attack type Condo does not deal with time.
them but they are covered by other schemes. W. Malicious Investigation of Docker Images on Basis of
• Hardware Dependency: Dependent with the TEE support Vulnerability Databases This paper aims at identifying the
and limits by its availability to some specific hardware main weaknesses that exist in Docker images and distinguish-
platforms only. ing between the official and community images. The tool
• Limited Evaluation: Security analysis centers around se- unveiled an even higher, 66% rate of exposure to potentially
lected CVEs and PoC which may not explore all actual critical vulnerabilities in the community images because of
case scenarios. old software and no updates. Scanning was performed using
V. DIVDS: Docker Image Vulnerability Diagnostic System Trivy that utilized multiple databases for different operating
The Docker Image Vulnerability Diagnostic System (DIVDS) systems’ vulnerabilities. K-means clustering was used to make
is a newly developed instrument proposed in this paper, which a comparison of threats depending on various image types.
is aimed at resolving Docker environment security issues Technologies Used:
by diagnosing vulnerability risks of Docker images during • Tool: Trivy for static vulnerability scanning.
the upload and download processes. DIVDS consists of two • Data Source: Docker Hub repository images classified as
main modules: IVD (Image Vulnerability Detection): Identi- official or community.
fies vulnerability from the metadata and checks them with • Analysis: K-means clustering for threat level categorization
Ubuntu CVE Tracker and RedHat Security Data among other and elbow method for optimal cluster
vulnerability databases. IVE (Image Vulnerability Evaluation): • Scoring: Vulnerability severity was evaluated using CVSS
Estimates a vulnerability value according to the analyzed scores.
threats, checks the value with the given tolerance for usage, Limitations:
and decides whether the image can be employed. DIVDS • Tool Limitations: Trivy only depends on selected vulnera-
increases the level of security by stopping the distribution bility databases so that some unique opportunities can be
of the potentially unsafe Docker images and offering an unnoticed outside its database.
organized method of assessment. The evaluation demonstrated • Data Bias: Covers only Docker images which presents po-
the effectiveness of DIVDS in identifying vulnerabilities in tential limited re- applicability in other container platforms
widely-used images like ubuntu:latest and java:latest. or environments.
Technologies Used: • Static Analysis Constraints: Some of the exposed vulner-
• Clair: Software tool that is used, for scanning for vulnera- abilities could only be discovered in still captures and not
bilities. when actively running and undergoing configuration change.
• Docker Engine: Allows for image management and to tie-in • Inconsistent Updates: Many images, especially community-
with DIVDS. provided ones, had not been updated for over a year,
skewing the number of vulnerabilities identified. out from the target network, and network hopping.
• Security Thresholds: The lack of standardized thresholds for Limitations:
determining ”maliciousness” impacted result interpretation. • Detection Complexity: Self-propagating malware can hardly
X. Monitoring Solution for Cloud-Native DevSecOps This be detected and prevented with the
research offer an architectural solution and implementation of • Scope: Mainly investigated Docker-based CI systems; re-
an automated monitoring solution for cloud native DevSecOps sults might not be applicable to systems with other CI
environments to fill the gap on lack of homogenous monitoring structures.
framework for the infrastructure as well as the applications. • Resource Requirements: A requirement of certain CI con-
This becomes achievable through incorporating of tools from figurations such as Docker in Docker setups are a feature
the open source domain to deliver health metrics, log analysis, of demonstrations.
and alerting in real time while supporting agility, scalability, • Mitigation Challenges: Other solutions such as reproducible
and security. builds imply a massive shift in CI
Technologies Used: Z. Security Analysis of Docker Containers for ARM Ar-
• Infrastructure Tools: For example, Docker to management chitecture This paper assesses the security risks of Docker
containers and the Transport Layer proxy and communica- containers for ARM architecture which is important to IoT and
tion technology called Traefik. edge computing devices. Analyzing official Docker images for
• Monitoring Tools: For system level, node exporter, vulnerabilities was done with help of Trivy, Clair, Snyk and
Prometheus and Grafana. JFrog; the impact of tools and time on vulnerabilities detection
• Application Monitoring: ELK for logging collection and was also compared. Real life examples learnt through dynamic
analysis as one of the major innovations in Big Data and analysis on Raspberry Pi devices depicted the significance of
Analytics. security.
• Data Collection: For extracting log data from worker nodes Technologies Used:
you have Filebeat and Logstash. Framework: Thanks to • Scanning Tools: Since it deals with identification of CVE,
the microservices architecture, modularity and scalability we have Trivy, Clair, Snyk and JFrog.
aspects are achieved. • Devices: This cluster is utilized from Raspberry Pi 4B+
• Deployment: Distribution on the cloud-native OpenStack
model for dynamic testing.
computing platform with support for • Metrics: Used CVSS for severity; GHSA for the vulnera-
Limitations: bility focused on unique and non-unique vulnerabilities in
• Evaluation Pending: Lack of results obtained from experi- the Linux distributions such as Debian and Ubuntu.
ments on the efficiency of the proposed framework. • Dynamic Testing: Attacked known vulnerable systems on
• Agent-Based Approach: Tied exclusively to data collected simple but armable Kubernetes structures such as K3S.
by agents within the computing system, therefore may not Limitations:
capture serverless or other transient resource information. • Tool Constraints: There are tools (for example, Clair, JFrog)
• Toolchain Integration Challenges: Interdependency on sev-
which are incompatible with ARM-based engines that re-
eral components can lead to integration and compatibility duce the efficiency of full scanning.
problems since the components are open source. • Dynamic Analysis Challenges: Few resources are available
Y. Reflections on Trusting Docker: Invisible Malware in for observing system calls on ARM when considering
Continuous Integration Systems This work explores the risks runtime issues.
and trust issues which are associated with Docker-based CI • Dataset Restrictions: Due to practical limitations stemming
systems. Self-hosted architecture properties are identified and from the analysis of large datasets, scanning was only
the research shows how malware can backdoor CI systems, performed on the official ARM images.
persist through updates, and compromise production artifacts. • Temporal Limitations: At two different time, given vul-
A PoC targeting GitLab CI was done showing how covert nerability values were calculated which do not illustrate
channels for malware updates exist and the difficulties in continuous evolution.
detecting them because nothing exists in the source repo. AA. Security Audit of Docker Container Images in
Technologies Used: Cloud Architecture This paper provides a way of auditing
• Proof-of-Concept: A self-generating virus working on security of Docker container images in cloud environment.
Docker client interface. This paper proposes a Vulnerability-Centric Analysis (VCA)
• Environment: This has been testified in GitLab CI inside a of Docker images, as well as use cases compatible with the
custom Docker image. OWASP Container Security Verification Standards and the
• Methodology: Used CI container life-cycle also targeted NIST SP 800-190 standards. Essential discoveries point more
dependency injection used covert channels for the controls risks that are as a result of; old packages, wrong setting, and
and updates. poor barriers on systems.
• Payload: Some of them are: placing Trojans in pre-release Technologies Used:
software binaries, copying and transmitting key information
• Framework: Image security vulnerability assessment and into branches was done manually, which may create incon-
management approach known as Vulnerability-centric ap- sistencies.
proach (VCA). • Scope Restriction: The work considers only official repos-
• Tools: Google Container Registry Vulnerability Scanning itories, excluding community or verified repositories.
API. • Limited Package Types: Focuses on native (OS), Node.js,
• Standards Alignment: We have identified the OWASP Con- and Python packages while ignoring R or Java as package
tainer Security Verification Standards and the NIST SP 800- types.
190 guidelines. • Semantic Versioning Assumptions: Assumes homogeneity
• Use Cases: The audit-focused scenarios of containers in dif- in packages following semantic versioning, which isn’t
ferent phases such as base image inspection and Dockerfile guaranteed.
settings, image signing and authorization. • Exclusion of Anomalous Repositories: Five repositories
• Scanning Categories: Had the major classes and subdeliv- with poorly described versioning or branching were ex-
erables of operating systems, database, programming lan- cluded.
guages, web, and application platform. AC. The Practice and Application of a Novel DevSecOps
Limitations: Platform on Security
• Narrow Scope: They are mainly oriented to vulnerabilities in Summary: This paper introduces a self-designed DevSec-
Docker images but they do not cover container orchestration Ops platform for safe and efficient software release by China
tools. Telecom. The tool incorporates security features into DevOps
• Tool Dependency: Due to the heavy use of the Google via its Security Center, which includes permission manage-
Container Registry’s API, vulnerability scanning was not ment, scanning engines, and defect reporting. In this way,
very generalizable. the platform also checks code quality and performs security
• Static Analysis Bias: Concerning the dynamic and the checks for compliance into pipelines, enabling independent
runtime security issues, there was no adequate solution. scans. Currently, it supports approximately 62,000+ users,
• Compliance Gaps: While traditional methods of verification includes over 10,000+ projects, and analyzes more than 4.5
do facilitate a relatively high degree of correlation between billion+ lines of code.
security measures and cloud-native models, these processes Limitations:
themselves may not be fully suited to the new paradigms. • Static Scanning Limitations: Compared to pipeline scan-
AB. Scanning Categories: Had the major classes and ning, independent scanning does not support some lan-
subdeliverables of operating systems, database, program- guages, and the accuracy of the model is relatively low.
ming languages, web, and application platform. • Server Mode Constraints: The server scanning mode
Summary: This study examines the consequences of en- combines some issues with elastic scalability methods, and
abling production accounts for official Docker Hub images. It new questions regarding repository tokens’ security appear.
explores package changes in 37,000 images of 158 official • False Positives: Static analysis tools may provide results
repositories. The research highlights problems arising from that contain errors, requiring additional verification by pro-
package changes, particularly concerning the functionality of grammers.
utility packages, which may result in poor performance and • Implementation Challenges: It was assumed that a culture
security threats. It discourages in-place updates in version change and a significant amount of training are the key
updates of Docker images and encourages testers to conduct prerequisites for successful DevSecOps implementation.
thorough checks before deployment. Technology in Use:
Technologies Used: • Tools:
• Tools: – Static code scanners: SonarQube, Fortify, CodeSec.
– Docker Hub: Source used for data collection of infor- – Software Component Analysis: Tools supplied by
mation repositories and images. Haiyunan and Woodpecker.
– Docker CLI: Utilized for image analysis, as well as for • Scanning Modes:
metadata identification. – Pipeline Scanning: Additional post-build scan to ensure
• Metrics: Types of package changes separated as major, high accuracy of the program.
minor, or patch according to semantic versioning. – Independent Scanning: For increased flexibility, stan-
• Analysis: Standard deviation and variance of the nature of dalone static analysis.
packages that are upgraded and downgraded with different • Deployment: Two resource pools (Guangzhou and
repository categories. Guizhou) were built with the client-server approach.
• Dataset: Over 37,000 image tags crawled from 158 official
• Metrics: Risk classification: Critique, high, middle, and
sources. low-risk categories of defects.
Limitations: AD. Vulnerability Analysis of Docker Hub Official Im-
• Manual Branch Identification: Division of repositories ages and Verified Images
Summary: This study analyzes security vulnerabilities in • Static vs. Dynamic Analysis: Static tools lack runtime
official and verified Docker Hub images using four popu- detection capabilities, underscoring the need for dynamic
lar open-source image scanning tools: Anchore, Aqua Trivy, analysis.
Docker Scan, and JFrog Xray. It reviews the general count, • Supply Chain Security: Securing third-party dependen-
the general risks, and the exclusive CVEs of images that cies and base images is essential.
were chosen, such as Ubuntu, Nginx, MySQL, Mongo, and • Performance Trade-offs: Balancing robust security with
Postgres. The study shows that official images are, as a rule, system performance remains a challenge.
less susceptible to threats compared to verified images and • Compliance and Standards: Adherence to OWASP and
are, therefore, safer. Additionally, Aqua Trivy found the most NIST standards is vital yet difficult in evolving ecosys-
vulnerabilities compared to other tools, while Docker Scan tems.
was the least effective in detecting vulnerabilities. Challenges include tool inconsistencies, scalability, dynamic
Limitations: threats, CI/CD integration, and false positives/negatives. Fu-
• Tool Inconsistency: It was identified that there are vari- ture directions focus on:
ances in the number and intensity of these vulnerabilities • Leveraging AI for vulnerability detection and automated
disclosed by different tools. remediation.
• Limited Scope: Chen and colleagues only included five • Improving tool interoperability and consistency.
official and five corresponding verified images for analysis; • Advancing runtime security and automated compliance
thus, the results may not be generalizable. checks.
• Severity Confusion: The issues discovered during the study • Enhancing supply chain security and addressing edge/IoT
were presented in CVEs, some of which were categorized challenges.
with different severity levels depending on the tool used in • Optimizing performance while maintaining robust secu-
the analysis. rity.
• Dependency on Free Tools: Freeware tools, which may In summary, integrating security throughout the develop-
have better precision, were not considered because many of ment lifecycle is essential. As containerization grows, scalable,
them provide only a restricted number of features in the test efficient, and innovative security solutions are increasingly
version. critical.
• Outdated Data: Some of the risks were due to old libraries,
and sources like maybewhere.org or others may not contain R EFERENCES
the latest information on how such programs or applications [1] Assessing Security Risks of Software Supply Chains Using Software
Bill of Materials.
may actually be used. [2] Design and Practice of Security Architecture via DevSecOps Technol-
Technology in Use: ogy.
[3] Detection, Analysis, and Countermeasures for Container-Based Miscon-
• Tools: Anchore, Aqua Trivy, Docker Scan, JFrog Xray. figuration Using Docker and Kubernetes.
• Metrics: The total number of weaknesses categorized as [4] Development of Secure Software Based on the New DevSecOps Tech-
Critical, High, Medium, and Low risk. Yearly trends in the nology.
[5] DevSecOps: A Security Model for Infrastructure as Code Over the
number of different CVEs from the year 2005 to 2023. Cloud.
• Dataset: Top 5 official images (Ubuntu, Nginx, MySQL, [6] Enhancing DevSecOps: Three Custom Tools for Continuous Security.
Mongo, Postgres) with their top 5 verified counterparts [7] Framework to Secure Docker Containers.
[8] Implementation of DevSecOps by Integrating Static and Dynamic Se-
using download counts and update frequency. curity Testing in CI/CD Pipelines.
• Vulnerability Sources: CVE and NVD databases, as well [9] Implementing and Automating Security Scanning to a DevSecOps
as advisories released by software vendors, are more formal CI/CD Pipeline.
[10] Improving Substation Network Security with DevSecOps and AIOps.
compared to the information provided by the wider commu- [11] Native Container Security for Running Applications: A Review.
nity. [12] Last Line of Defense: Towards certifying dependable SCADA networks,
• Analysis: Comparative analysis of total reported vulnerabil- we propose to foster cyber threat hunting with deception in Reliability
Through Inducing Cyber Threat Hunting with Deception in SCADA
ities and their impact on both official and verified images. Networks.
[13] Secure Inter-Container Communications Using XDP/eBPF.
III. C ONCLUSION AND F UTURE D ISCUSSIONS [14] Towards an Understanding of Docker Images and Performance Conse-
quences on Container Storage Systems at Scale.
This review of 30 studies on Docker image vulnerabilities [15] Hyperion: Impact Hardware High-Performance and Secure System for
within DevSecOps highlights the critical need for integrating Container Networks.
[16] A Hybrid System Call Profiling Model for Container Protection.
security across the software lifecycle. Key insights include: [17] Cloud Migration Research: A Systematic Review.
• Prevalence of Vulnerabilities: Many Docker images [18] SysFlow: Towards a Programmable Zero Trust Security Architecture for
Systems.
contain significant vulnerabilities, necessitating continu- [19] Container Cloud Security Vulnerability: An Empirical Analysis of
ous monitoring. Security Risks Associated with Information Leakages.
• Tool Inconsistencies: Scanning tools (e.g., Trivy, Clair, [20] Ambush from All Sides: Analyzing security threats for open-source
SWE CI/CD Pipelines.
Snyk) often produce inconsistent results, requiring stan- [21] Condo: Enhancing Container Isolation Through Kernel Permission Data
dardization. Protection.
[22] DIVDS: Docker Image Vulnerability Diagnostic System.
[23] Malicious Investigation of Docker Images on Basis of Vulnerability
Databases.
[24] Monitoring Solution for Cloud-Native DevSecOps.
[25] Reflections on Trusting Docker: Invisible Malware in Continuous Inte-
gration Systems.
[26] Security Analysis of Docker Containers for ARM Architecture.
[27] Security Audit of Docker Container Images in Cloud Architecture.
[28] Scanning Categories: Had the major classes and subdeliverables of oper-
ating systems, database, programming languages, web, and application
platform.
[29] The Practice and Application of a Novel DevSecOps Platform on
Security.
[30] Vulnerability Analysis of Docker Hub Official Images and Verified
Images.