Container Security Slides - V3
Container Security Slides - V3
• Presentation Slide
• LAB Tutorial Supplement
qualys.com/learning
2
Maximize the
screen
Start the
tutorial
• Container Vulnerabilities
Container Image Vulnerabilities and Misconfiguration
and Misconfiguration
• Container Network
Misconfiguration
• Container Escape
Container
Container
Image
Image
Orchestration Engine
Vulnerabilities and
Orchestration Engine Misconfiguration
Container Engine
Qualys Cloud platform on TCP port 443 and
Container Engine Container Engine
Docker host vulnerability and compliance posture require Qualys Cloud Agents
or an authenticated scan through a Qualys Scanner Appliance.
Kube-API Server P P P P P P P P P
P P P P P P
1 2 3 4 6 1 2 3 4 6 1 2 3 4 6
Container Sensor
(Vulnerability and
Compliance Assessment of
Container
Container
containers and images)
OpenShift 4.x
OpenShift 4.x Infrastructure CRI-O
Security RCOS
• Configure sensor profiles to control which sensors are used for scanning different
registries
• Configure sensor log settings
• Configure a time window when the sensor will be dormant
• Configure data collection method for vulnerability assessment
Get container
inventory and
vulnerability posture
28 Qualys, Inc. Corporate Presentation
Tracking Images Sources
Identify Images in unprotected Registries
Install and
Identify Deploy
Configure
CICD Sensor
Scans Built CI Plugin Qualys Cloud
Image Pulls Scan Platform
Results (QCP)
Unprotected CI Plugin
Code CI Pipeline Image CI Gate
Build
BuildPass
Fail
CI Plugin
Tags Image:
qualys_scan_target:<image_id>
Build Ship
37 Qualys, Inc. Corporate Presentation
Actionable Vulnerability Information
SCA Scans
Container Registry
2
Im
ag 3 Listing Phase
ull
el 4
eP
ist • Step 1
ag
Sc to
sca
Im
an • Step 2
da n
ta
6 5
Scan image for Scanning Phase
vulnerabilities • Step 3
• Step 4
• Step 5
Docker Engine • Step 6
Host/VM • Step 7
• Configure sensor profiles to control which Registry Sensors are used for
scanning different registries
ta
job
da
an
Scanning Phase
an
Sc 1
Sc
• Step 3
4 • Step 4
Scan image 2 • Step 5
for
• Step 6
vulnerabilities Docker V2 API call Nexus
Docker Private
Image Pull
jFrog Artifactory
Docker Engine
Host/VM 3 Host / VM
• When enabled you can use wild cards for Repository and Image names in
the registry scan job
• Simplifies scanning large number of images matching the wildcard pattern
59 Qualys, Inc. Corporate Presentation
Registry Scan Results
Total numbe
vulnerable im
in the reposit
Sensor)
General Sensor
Dockerfile
:8080 EXPOSE 8080
FROM tomcat:latest
COPY bodgeit.war /usr/local/tomcat/webapps
COPY bodgeit.war
bodgeit.war
EXPOSE 8080 /usr/local/tomcat/webapps
CMD [“catalina.sh”, “run”]
FROM tomcat:latest
65
Vulnerability posture
Compliance posture
Identify the
compliance posture of
the image.
• Contain vulnerabilities or
software, not found in the
image from which the Find containers
container is spawned. having drift software
or vulnerabilities
• Are considered abnormal
behaviour and may an indicate
malicious activity
Scenario
• Drift containers
• Drift + Root Privilege containers
• Drift + Root Privilege + Severity 5
Vulnerability containers
Solution
Custom widgets to track containers
matching above criteria
Deploy AWS
Fargate Task
Amazon Elastic Container
Registry (ECR)
AWS Fargate
4
Fargate event Source Image
EventBridge
Trigger 3
Deploy
Unprotected CI Plugin scanned and
CI Gate General Sensor
Code CI Pipeline Image CD approved Images Scan host using
Build Pass Pipeline scans
Cloud Agent
containers and
CI Plugin detects drift
Tags Image:
qualys_scan_target:<image_id>