際際滷

際際滷Share a Scribd company logo
Container Security
By
Ramki Seshagiri
One of the main cyber-risks is to think they dont
exist. The other is to try to treat all potential risks.
It takes 20 years to build a reputation and few
minutes of cyber-incident to ruin it.
-Stephane Nappo, CISO
Agenda

Case Studies

Hygiene factors

DevSecOps (Best Practices)

Tools

Platform Specific (AWS, Azure)
Quick Refresher

Container

Image
Case Studies
Hygiene Factors

Images
 Fully patched
 SELinux or AppArmor
 Least number of user accounts
 Scan before pushing into registry
DevSecOps  Best Practices
ProcessPeople
Technology
- Architectural reviews
- Automation (SAST/DAST, freq)
- Security breakpoints
- Management buy-in
- Shift-left philosophy
- Training (time & resources)
- Static code analyzers (CVE intergated)
- Logging, monitoring & auditing
- Vulnerability scanners
- Threat Modelling
Purpose Recommendations
Image Vulnerability Scanning
Source-code Scanning
Run-time Security
Compliance & Audit
Comprehensive Security
Tools
Platform-specific (AWS / Azure)
Registry 
EC2 Container Registry

DockerHub*

Azure Registry

DockerHub

Quay
Access Control 
IAM

STS

IAM
Vulnerability Scanning 
Clair 
Qualys
Run-time protection 
Aqua

AlertLogic

PaloAlto

Aqua#
CYBERSAFEHAVEN CONSULTING
ramki@cybersafehaven.com

More Related Content

Container security