SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
Copyright @ 2018 Aqua Security Software Ltd. All Rights Reserved.
@lizrice | @aquasecteam
Liz Rice (with credits to Justin Cormack at Docker)
Practical steps for securing
containers
2@lizrice | @aquasecteam
Bad headlines
3@lizrice | @aquasecteam
4@lizrice | @aquasecteam
5@lizrice | @aquasecteam
ObserveCode HostsTest Build Run
Pipeline
6@lizrice | @aquasecteam
ObserveHostsBuild RunTestCode
Code
quality
Security
testing
Security
policies
Minimal
attack
surface
Least
privilege
Defence
in depth
Principles
ObserveCode HostsTest Build Run
Code quality
Security starts in development
8@lizrice | @aquasecteam
11@lizrice | @aquasecteam
Static analysis
Code review
Code quality
ObserveCode HostsTest Build Run
Security testing
Catch problems early
13@lizrice | @aquasecteam
“(83) In order to maintain security and to prevent processing in infringement of this
Regulation, the controller or processor should evaluate the risks inherent in the processing
and implement measures to mitigate those risks, . Those
measures should ensure an appropriate level of security, including confidentiality, taking
into account the state of the art and the costs of implementation in relation to the risks and
the nature of the personal data to be protected. In assessing data security risk,
consideration should be given to the risks that are presented by personal data processing,
such as accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or
access to, personal data transmitted, stored or otherwise processed which may in particular
lead to physical, material or non-material damage. ”
REGULATION (EU) 2016/679 OF THE
EUROPEAN PARLIAMENT
such as encryption
GDPR compliance
15@lizrice | @aquasecteam
16@lizrice | @aquasecteam
Automated testing
is not just for functions
Security testing
ObserveCode HostsTest Build Run
Security policies
Always be in compliance
18@lizrice | @aquasecteam
6.1 Ensure that all system components and software are protected from known
vulnerabilities by having the latest vendor-supplied installed.
Deploy critical patches within a month of release.
6.2 Establish a process to identify and assign a risk ranking to newly discovered security
vulnerabilities. Risk rankings should be based on industry best practices and guidelines.
Ranking vulnerabilities is a best practice that will become a requirement on
July 1, 2012.
Payment Card Industry
Data Security Standard version 2.0
security patches
Ranking vulnerabilities
PCI compliance
20@lizrice | @aquasecteam
FROM wordpress:demo
COPY microscanner /microscanner
RUN chmod +x /microscanner
ARG token
RUN /microscanner --html ${token} > /ms-out.html
docker build -f Dockerfile.wp --build-arg=token=$TOKEN .
MicroScanner
21@lizrice | @aquasecteam
MicroScanner
22@lizrice | @aquasecteam
Scanning tools
Image admission controls
Security policies
ObserveCode HostsTest Build Run
Host configuration
Don’t make it easy for attackers
24@lizrice | @aquasecteam
Files directly on
host machine(s)
Files in container
images
Host vulnerabilities
25@lizrice | @aquasecteam
Host vulnerabilities
27@lizrice | @aquasecteam
CIS Docker Benchmark
CIS Kubernetes Benchmark
Host configuration
29@lizrice | @aquasecteam
ObserveCode HostsTest Build Run
Least privilege
Only give what you need
31@lizrice | @aquasecteam
34@lizrice | @aquasecteam
Minimize bind mounts
Set USER in Dockerfile
Avoid --privileged
Least privilege
ObserveCode HostsTest Build Run
Runtime protection
Spot unexpected behaviour
36@lizrice | @aquasecteam
39@lizrice | @aquasecteam
Seccomp / AppArmor
Commercial tools
New runtimes
Runtime protection
40@lizrice | @aquasecteam
Runtime
protection
Static
analysis
Minimal
container
OS
TLS checks
Automated
scanning
Read-only,
limit
privileges
Actions
41@lizrice | @aquasecteam
Runtime
protection
Minimal
container
OS
Automated
scanning
Read-only,
limit
privileges
TLS checks
Static
analysis
Code
quality
Security
testing
Security
policies
Minimal
attack
surface
Least
privilege
Defence
in depth
Principles
42@lizrice | @aquasecteam
Copyright @ 2018 Aqua Security Software Ltd. All Rights Reserved.
@lizrice | @aquasecteam
github.com/aquasecurity/microscanner
github.com/aquasecurity/kube-bench
github.com/lizrice/no-meltdown

Weitere ähnliche Inhalte

Mehr von Michael Man

Mehr von Michael Man (15)

Chris Rutter: Avoiding The Security Brick
Chris Rutter: Avoiding The Security BrickChris Rutter: Avoiding The Security Brick
Chris Rutter: Avoiding The Security Brick
 
Extract: DevSecOps - London Gathering (March 2019)
Extract: DevSecOps - London Gathering (March 2019)Extract: DevSecOps - London Gathering (March 2019)
Extract: DevSecOps - London Gathering (March 2019)
 
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
Control Plane: Security Rationale for Istio (DevSecOps - London Gathering, Ja...
 
Matt Turner: Istio, The Packet's-Eye View (DevSecOps - London Gathering, Janu...
Matt Turner: Istio, The Packet's-Eye View (DevSecOps - London Gathering, Janu...Matt Turner: Istio, The Packet's-Eye View (DevSecOps - London Gathering, Janu...
Matt Turner: Istio, The Packet's-Eye View (DevSecOps - London Gathering, Janu...
 
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...
Control Plane: Continuous Kubernetes Security (DevSecOps - London Gathering, ...
 
August 2018: DevSecOps - London Gathering
August 2018: DevSecOps - London GatheringAugust 2018: DevSecOps - London Gathering
August 2018: DevSecOps - London Gathering
 
DevSecOps - London Gathering : June 2018
DevSecOps - London Gathering : June 2018DevSecOps - London Gathering : June 2018
DevSecOps - London Gathering : June 2018
 
Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!
 
The mechanics behind how attackers exploit simple programming mistakes ...
The mechanics behind how attackers exploit simple programming mistakes ...The mechanics behind how attackers exploit simple programming mistakes ...
The mechanics behind how attackers exploit simple programming mistakes ...
 
Secret Management Journey - Here Be Dragons aka Secret Dragons
Secret Management Journey - Here Be Dragons aka Secret DragonsSecret Management Journey - Here Be Dragons aka Secret Dragons
Secret Management Journey - Here Be Dragons aka Secret Dragons
 
DevSecOps March 2018 - Extract
DevSecOps March 2018 - ExtractDevSecOps March 2018 - Extract
DevSecOps March 2018 - Extract
 
DevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOpsDevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOps
 
Dynaminet -DevSecOps
Dynaminet -DevSecOpsDynaminet -DevSecOps
Dynaminet -DevSecOps
 
DevSecOps: Test Automation
DevSecOps: Test AutomationDevSecOps: Test Automation
DevSecOps: Test Automation
 
Project management experience security in agile 1309
Project management experience security in agile 1309Project management experience security in agile 1309
Project management experience security in agile 1309
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Practical Steps For Securing Containers - Liz Rice