Six big misconceptions about container safety

Source: Internet
Author: User
Keywords Virtualization Technology Enterprise Security
Tags application behavior business company cto enterprise enterprise security get

Six big misconceptions about container safety. Many businesses still praise the idea that traditional virtualization is safer than container technology. John Morello, who had served as chief information security officer at Albemarle, a Global 500 company, and currently CTO at Twistlock, said he wrote this article to uncover many of the misconceptions about container technology security and to get readers' attention on Business really should be concerned about the problem.

Misunderstanding one: the container can jailbreak (jailbreaks)

Prison Breaks can sound scary, but in reality it seldom happens. Most attacks are specialized attack applications, if the invasion has been applied, why need jailbreak it? In fact, businesses need to be concerned about the issue: clear hackers launched a specific time, and whether the system has been attacked.

Misunderstanding 2: Only solve the problem of multi-tenancy, containers can be used for production environment

No single company is really plagued by multi-tenancy issues. In fact, as long as the application is split into multiple microservices, and deployed in the virtual machine, the problem immediately resolved.

Misunderstanding 3: With the firewall you can protect the container application

Container applications often switch hosts within seconds, and even when payload is encrypted, the firewall can be useless. Container security ultimately depends on the perception of the application and the developer's security awareness.

Myth # 4: Endpoint Security is an effective way to protect microservices

Endpoint Security While well suited for protecting laptops, PCs, and mobile devices, endpoint security is not about protecting microservices. In fact, they are useless for microservices attacks. Endpoint Security can not get involved in Docker runtime and container choreography.

Misunderstanding 5: Use Dockerfiles FROM directive plus latest parameters can get the latest version

Vulnerability management is not as easy as it might seem. Source images are not always updated as the project progresses. Even if you use the latest mirror base layer, there may be hundreds of components in the mirror that are not included in your base layer packet manager. Due to frequent changes in the environment, the traditional patch management method basically no effect.

In order to solve this problem you can:

1) Found a loophole in the Continuous Integration (CI) process

2) use quality gates from the outset to prevent unsafe or incompatible mirroring deployments

Misunderstanding 6: Unable to analyze the malicious behavior in the container

Container behavior can be monitored. There are several ways:

1) The container is declarative: The container manifest details the behavior of the container and can be used to translate into a security configuration file.

2) The container can be predicted: Developers often combine several well-known software components into a container micro-service for execution. Container deployment has more rules than virtual machine deployment.

3) The container is immutable: the container changes only when the program is updated, and once it is found that the container behaves differently, either the configuration has changed or it is attacked.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.