The state of container security: 5 key steps to locking down your releases

Over the last couple of years, the rise in software supply chain attacks has increased container security risks - and heightened the need for organizations to deploy controls for managing and mitigating those risks.
As containers have become fundamental to modern software development and deployment, it is vital to secure them, said Patrick Tiquet, vice president for security and architecture at Keeper Security.
Here are five essential best practices - and recommendations for modern application security tooling - to lock down your organization's containers and ensure secure software releases.
Kong Yew Chan, director of product management, container security at Qualys, said key encryption should be secured with external key management, so that only authorized individuals can retrieve the encryption key to encrypt or decrypt the sensitive data.
KC Berg, chief architect at the API security testing firm StackHawk, said administrators should treat all containers as if they contain personally identifiable information.
StackHawk's Berg said other measures organizations can take to maintain visibility into dependencies in container environments include enabling container scanning in the Docker registry, running a container registry as a cache and then scanning third-party containers, scanning containers for vulnerable packages on every pull request, and using vulnerability-testing tools.
Control supply chain risks in container ecosystems Vulnerabilities in the software supply chain pose a major security risk in container environments.
It's also a good idea to deploy container runtime security tools such as binary analysis to detect configuration drifts and malicious threats in the runtime environments, Chan said.
Tam pointed to a recent survey that Tigera conducted of more than 1,200 users who are actively using Calico open-source networking and security tools in their container and Kubernetes environments.
Rethinking container security requires the right tools Build pipeline attacks are on the rise, and software supply chain security is front and center.
To ensure container security, you need to know if someone has changed or introduced malware in your container images - just like your code.
Choosing the right tool to run within the container to monitor for compromise and evaluate the current security posture is critical.
Lisa Azevedo, CEO of container security firm Containn, said one big limitation with many current container security products and services is that they are reactive, designed to detect after-the-fact security vulnerabilities.
Many container security products allow organizations to scan for and detect known security issues but do little to prevent them from happening in the first place.
Most tools, at best, allow organizations to get a point-in-time assessment of security vulnerabilities in the container environment, she said.
Currently available container security tools generally are good at detecting existing vulnerabilities, providing a remediation report, and pushing the work of fixing the issues back to the development team.
The key is to ensure container security by pushing it further left during the build process, Azevedo said.
Organizations should be thinking about how to implement container security at scale from the beginning and finding ways to maintain control of container deployments and state.
The focus should be on shrinking the attack surface while maintaining control of deployments and container state.
The goal is to be able to spin up containers that are standardized for specific environments and integrate security and compliance features such as those required under various industry regulations and national data security and privacy mandates.


This Cyber News was published on securityboulevard.com. Publication date: Thu, 04 Jan 2024 02:43:04 +0000


Cyber News related to The state of container security: 5 key steps to locking down your releases

The state of container security: 5 key steps to locking down your releases - Over the last couple of years, the rise in software supply chain attacks has increased container security risks - and heightened the need for organizations to deploy controls for managing and mitigating those risks. As containers have become ...
6 months ago Securityboulevard.com
What Is Container Security? Definition, Benefits, and Risks - Container security is a vital factor for all companies that use containers for running their software, as an alternative to using virtual machines. Container security is a total of policies and tools that are applied to maintain a container running ...
1 year ago Heimdalsecurity.com
The Art and Science of Container Security - As the adoption of containers accelerates, so does the imperative for robust container security strategies. The interconnected realms of containers and the cloud have given rise to innovative security patterns designed to address the unique ...
6 months ago Feeds.dzone.com
A Cybersecurity Risk Assessment Guide for Leaders - Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022's Cyber Risk Index, 85% of the survey's 4,100 global respondents said it's somewhat to very likely they will experience a cyber attack in the next 12 months. ...
1 year ago Trendmicro.com
A Handbook for Managing Containers on Amazon Web Services - Container management is a way to help you create, govern, and maintain your containers. There are tools and services available that can automate the creation, deployment, maintenance, scaling, and monitoring of application or system containers. In ...
1 year ago Trendmicro.com
How to Use Titan Security Keys With Passkey Support - Google's updated Titan Security Keys can serve as a multifactor authenticator and store passkeys to replace passwords. Google announced the availability of Titan Security Keys with passkey support in mid-November 2023; the initial Titan Security Keys ...
6 months ago Techrepublic.com
Implementing container security best practices using Wazuh - This article will explore how Wazuh helps implement best security practices for containerized environments. Wazuh is a free, open source security platform that offers unified XDR and SIEM capabilities across workloads in cloud and on-premises ...
2 months ago Bleepingcomputer.com
Behind EB Control's Revolutionary Patented Key Management System - If you're knee-deep in the world of data security, you'd agree that the key to unlocking superior protection lies, quite literally, in the keys- the encryption keys, to be precise. When it comes to managing these critical elements to safeguard your ...
6 months ago Securityboulevard.com
Locking down container security once and for all with Rust-based Edera - One of the ultimate cloud security nightmares is when someone breaks through your container runtime into its underlying operating system. To prevent such attacks, Edera is taking an old program into a new language to provide a memory-safe container ...
2 months ago Zdnet.com
Uncovering the hidden superpowers of your smartphone - Picture this: You've just dashed out of your favorite café, already late for a meeting, when that heart-sinking realization hits you: your phone isn't in your pocket where it should be. Think back to when smartphones were a shiny new concept - a ...
5 months ago Blog.avast.com
Should You Shut Down Your Computer Every Night? - Although PCs benefit from an occasional reboot, it's not necessary to turn off your computer every night. The decision to let your computer sleep vs. shut down depends on considerations such as the device's age, your usage habits, and whether you ...
5 months ago Pandasecurity.com
What is Biometric Security? Your Body Becomes Your Key - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
5 months ago Hackersonlineclub.com
10 reasons why securing software supply chains needs to start with containers - Containers and Kubernetes are table stakes for multi-cloud app development, and they're also among the least protected of any areas of software supply chains. Kubernetes commands 92% of the container orchestration platform market, despite DevOps ...
5 months ago Venturebeat.com
'Leaky Vessels' Cloud Bugs Allow Container Escapes Globally - One of the vulnerabilities, designated as CVE-2024-21626, impacts runC, the lightweight container runtime for Docker and other container environments. It is the most urgent of the four vulnerabilities, with a severity score of 8.6 out of a possible ...
5 months ago Darkreading.com
2024 Trends for Securing Your Business Premises: Essential Strategies and Technologies - As you look ahead to 2024, the landscape of physical security is evolving rapidly, with new trends emerging that could reshape how you protect your business premises. Advances in technology, such as artificial intelligence, are playing a pivotal role ...
6 months ago Hackread.com
Product showcase: Protect digital identities with Swissbit's iShield Key Pro - In today's fast-paced business world, protecting digital identities and optimizing daily workflows are crucial. The iShield Key Pro series from Swissbit addresses these challenges by offering top-notch security combined with effortless usability. ...
3 days ago Helpnetsecurity.com
Defend Your Business: Testing Your Security Against QakBot and Black Basta Ransomware - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Securityboulevard.com
How to Remove Malware + Viruses - Malware removal can seem daunting after your device is infected with a virus, but with a careful and rapid response, removing a virus or malware program can be easier than you think. We created a guide that explains exactly how to rid your Mac or PC ...
2 months ago Pandasecurity.com
Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
6 days ago Crowdstrike.com
US Man Jailed 8 Years for SIM Swapping and Apple Support Impersonation - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
7 months ago Hackread.com
Is it possible to use an external SSD to speed up your Mac - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
5 months ago Hackread.com
How to Temporarily Deactivate Instagram? - Instagram is an amazing social platform where you can stay in touch with your friends and influencers, but sometimes it can be too much. If Instagram has become too distracting or overwhelming for you to use effectively-whether for mental peace, ...
6 months ago Hackercombat.com
AsyncRAT Infiltrates Key US Infrastructure Through GIFs and SVGs - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
5 months ago Hackread.com
D3 Security at RSAC 2024: Streamline Your Security Operations with Smart SOAR - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Securityboulevard.com
Biggest Data Security Threats for Businesses: Strategies to Strengthen Your Defense - With cybercriminals continuously evolving their strategies to target sensitive data with sophisticated attacks, data security has become a universal priority-no matter the size of your business. With the right strategies, such as regular security ...
6 months ago Hackread.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)