SlideShare uma empresa Scribd logo
1 de 19
2
JASON EPSTEIN
Sr. Solutions Engineer, Mirantis, Inc.
(Docker Enterprise team)
MIRANTIS, INC.
Modern Apps at Enterprise scale
• Docker Enterprise Platform
• Mirantis Cloud Platform (MCP)
3
• Passionate containerist
• Avid runner
• Local craft beer enthusiast
About Jason
4
○ The importance of securing your container images
○ Introduction to image vulnerability scanning
○ Introduction to image signing
○ Glimpse into common products available in the marketplace
○ Demonstrate image scanning and signing
Goals Today
5
6
What is a Docker Container Image?
An Image is an ordered collection of root filesystem
changes and the corresponding execution parameters
for use within a container runtime. An image typically
contains a union of layered filesystems stacked on top
of each other. An image does not have state and it
never changes.
TL;DR
Images are the “blueprint” to your applications
● Shareable
● Immutable
7
● Know What’s Inside Your Apps
● Know Where Your App Images
Came From
● Know Who Modified Them
Ensure Your Images Are Safe to Run
A Multi-Layered Defense
"Developer use of older, vulnerable
versions is one of the leading causes of
container vulnerabilities.”
- Gartner, Best Practices for Running
Containers and Kubernetes in Production
8
Running vulnerable images exposes your
organization to threats.
Example:
CVE-2019-5021 (discovered May, 2019)
“Versions of the Official Alpine Linux Docker images
(since v3.3) contain a NULL password for the `root` user.”
(source: https://nvd.nist.gov/vuln/detail/CVE-2019-5021)
Why Is Container Image Security Important?
When the required
conditions are met, a
user (legitimate or not)
on your system can
easily gain root access
inside the impacted
container.
9
Software Delivery Lifecycle
Traditional Supply Chain
Software Supply Chain
10
Security Must Span the Entire Software Delivery Lifecycle
11
●CONTINUOUSLY SCAN FOR VULNERABILITIES IN ALL IMAGES
• Improve application security by
scanning for known vulnerabilities prior
to deployment and continuous checks
thereafter
• Ensure compliance with alerts to new
vulnerabilities
Trusted
Content
Image Scanning:
Know What’s Inside Your Apps
12
Image Content Trust:
Know Where Your Apps Came From and Who Modified Them
• Sign image to “approve” passing of each stage.
• Policy to check for signatures before deployment
CI Security Scanning Staging Production
13
Image Security Tools In the Marketplace
Anchore
Trusted Registry
14
15
Demo
16
Ensure Only Images Signed by Each Team Can be Run
Enforcing Docker Content Trust in Universal Control Plane (UCP)
17
● Scan your images for vulnerabilities
○ Scan every image and assess any vulnerabilities for risk and relevance in
your environment
○ Automate image filtering so that only those that meet your security
criteria make it to the next stage (including production)
● Sign your images to ensure image authenticity
○ Require CI tools, repositories, test tools, security tools, and all other
steps in your pipeline to cryptographically sign every image they process
○ Ensure every environment (including production!) that will run your
images checks for a valid signature from the required sources.
Container Image Security Takeaways
18
Questions?
19
Thanks!
Jason Epstein
jepstein@mirantis.com
www.linkedin.com/in/jasonepstein1/
Contact Mirantis: mirantis.com/contact
Request a demo: mirantis.com/demo

Mais conteúdo relacionado

Mais de Weaveworks

How to Avoid Kubernetes Multi-tenancy Catastrophes
How to Avoid Kubernetes Multi-tenancy CatastrophesHow to Avoid Kubernetes Multi-tenancy Catastrophes
How to Avoid Kubernetes Multi-tenancy Catastrophes
Weaveworks
 
Robust Network Security and Observability with GitOps and Cilium
Robust Network Security and Observability with GitOps and CiliumRobust Network Security and Observability with GitOps and Cilium
Robust Network Security and Observability with GitOps and Cilium
Weaveworks
 

Mais de Weaveworks (20)

How to Avoid Kubernetes Multi-tenancy Catastrophes
How to Avoid Kubernetes Multi-tenancy CatastrophesHow to Avoid Kubernetes Multi-tenancy Catastrophes
How to Avoid Kubernetes Multi-tenancy Catastrophes
 
Building internal developer platform with EKS and GitOps
Building internal developer platform with EKS and GitOpsBuilding internal developer platform with EKS and GitOps
Building internal developer platform with EKS and GitOps
 
GitOps Testing in Kubernetes with Flux and Testkube.pdf
GitOps Testing in Kubernetes with Flux and Testkube.pdfGitOps Testing in Kubernetes with Flux and Testkube.pdf
GitOps Testing in Kubernetes with Flux and Testkube.pdf
 
Intro to GitOps with Weave GitOps, Flagger and Linkerd
Intro to GitOps with Weave GitOps, Flagger and LinkerdIntro to GitOps with Weave GitOps, Flagger and Linkerd
Intro to GitOps with Weave GitOps, Flagger and Linkerd
 
Implementing Flux for Scale with Soft Multi-tenancy
Implementing Flux for Scale with Soft Multi-tenancyImplementing Flux for Scale with Soft Multi-tenancy
Implementing Flux for Scale with Soft Multi-tenancy
 
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKS
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKSAccelerating Hybrid Multistage Delivery with Weave GitOps on EKS
Accelerating Hybrid Multistage Delivery with Weave GitOps on EKS
 
The Story of Flux Reaching Graduation in the CNCF
The Story of Flux Reaching Graduation in the CNCFThe Story of Flux Reaching Graduation in the CNCF
The Story of Flux Reaching Graduation in the CNCF
 
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...
Shift Deployment Security Left with Weave GitOps & Upbound’s Universal Crossp...
 
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
Securing Your App Deployments with Tunnels, OIDC, RBAC, and Progressive Deliv...
 
Flux’s Security & Scalability with OCI & Helm Slides.pdf
Flux’s Security & Scalability with OCI & Helm Slides.pdfFlux’s Security & Scalability with OCI & Helm Slides.pdf
Flux’s Security & Scalability with OCI & Helm Slides.pdf
 
Flux Security & Scalability using VS Code GitOps Extension
Flux Security & Scalability using VS Code GitOps Extension Flux Security & Scalability using VS Code GitOps Extension
Flux Security & Scalability using VS Code GitOps Extension
 
Deploying Stateful Applications Securely & Confidently with Ondat & Weave GitOps
Deploying Stateful Applications Securely & Confidently with Ondat & Weave GitOpsDeploying Stateful Applications Securely & Confidently with Ondat & Weave GitOps
Deploying Stateful Applications Securely & Confidently with Ondat & Weave GitOps
 
Robust Network Security and Observability with GitOps and Cilium
Robust Network Security and Observability with GitOps and CiliumRobust Network Security and Observability with GitOps and Cilium
Robust Network Security and Observability with GitOps and Cilium
 
Intro to GitOps & Flux.pdf
Intro to GitOps & Flux.pdfIntro to GitOps & Flux.pdf
Intro to GitOps & Flux.pdf
 
Simplifying Hybrid Kubernetes with Weaveworks and EKS.pdf
Simplifying Hybrid Kubernetes with Weaveworks and EKS.pdfSimplifying Hybrid Kubernetes with Weaveworks and EKS.pdf
Simplifying Hybrid Kubernetes with Weaveworks and EKS.pdf
 
Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...
Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...
Weave GitOps 2022.09 Release: A Fast & Reliable Path to Production with Progr...
 
Building a Security First Approach Across Hybrid Cloud with GitOps and Policy...
Building a Security First Approach Across Hybrid Cloud with GitOps and Policy...Building a Security First Approach Across Hybrid Cloud with GitOps and Policy...
Building a Security First Approach Across Hybrid Cloud with GitOps and Policy...
 
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...
 
DevOps Automation with GitOps: Consistent and Secure End to End Deployments
DevOps Automation with GitOps: Consistent and Secure End to End DeploymentsDevOps Automation with GitOps: Consistent and Secure End to End Deployments
DevOps Automation with GitOps: Consistent and Secure End to End Deployments
 
Trusted Application Delivery: Achieving Ultimate Security
Trusted Application Delivery: Achieving Ultimate SecurityTrusted Application Delivery: Achieving Ultimate Security
Trusted Application Delivery: Achieving Ultimate Security
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Image is Everything (Let's Keep it Secure!) with Jason Epstein

  • 1.
  • 2. 2 JASON EPSTEIN Sr. Solutions Engineer, Mirantis, Inc. (Docker Enterprise team) MIRANTIS, INC. Modern Apps at Enterprise scale • Docker Enterprise Platform • Mirantis Cloud Platform (MCP)
  • 3. 3 • Passionate containerist • Avid runner • Local craft beer enthusiast About Jason
  • 4. 4 ○ The importance of securing your container images ○ Introduction to image vulnerability scanning ○ Introduction to image signing ○ Glimpse into common products available in the marketplace ○ Demonstrate image scanning and signing Goals Today
  • 5. 5
  • 6. 6 What is a Docker Container Image? An Image is an ordered collection of root filesystem changes and the corresponding execution parameters for use within a container runtime. An image typically contains a union of layered filesystems stacked on top of each other. An image does not have state and it never changes. TL;DR Images are the “blueprint” to your applications ● Shareable ● Immutable
  • 7. 7 ● Know What’s Inside Your Apps ● Know Where Your App Images Came From ● Know Who Modified Them Ensure Your Images Are Safe to Run A Multi-Layered Defense "Developer use of older, vulnerable versions is one of the leading causes of container vulnerabilities.” - Gartner, Best Practices for Running Containers and Kubernetes in Production
  • 8. 8 Running vulnerable images exposes your organization to threats. Example: CVE-2019-5021 (discovered May, 2019) “Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the `root` user.” (source: https://nvd.nist.gov/vuln/detail/CVE-2019-5021) Why Is Container Image Security Important? When the required conditions are met, a user (legitimate or not) on your system can easily gain root access inside the impacted container.
  • 9. 9 Software Delivery Lifecycle Traditional Supply Chain Software Supply Chain
  • 10. 10 Security Must Span the Entire Software Delivery Lifecycle
  • 11. 11 ●CONTINUOUSLY SCAN FOR VULNERABILITIES IN ALL IMAGES • Improve application security by scanning for known vulnerabilities prior to deployment and continuous checks thereafter • Ensure compliance with alerts to new vulnerabilities Trusted Content Image Scanning: Know What’s Inside Your Apps
  • 12. 12 Image Content Trust: Know Where Your Apps Came From and Who Modified Them • Sign image to “approve” passing of each stage. • Policy to check for signatures before deployment CI Security Scanning Staging Production
  • 13. 13 Image Security Tools In the Marketplace Anchore Trusted Registry
  • 14. 14
  • 16. 16 Ensure Only Images Signed by Each Team Can be Run Enforcing Docker Content Trust in Universal Control Plane (UCP)
  • 17. 17 ● Scan your images for vulnerabilities ○ Scan every image and assess any vulnerabilities for risk and relevance in your environment ○ Automate image filtering so that only those that meet your security criteria make it to the next stage (including production) ● Sign your images to ensure image authenticity ○ Require CI tools, repositories, test tools, security tools, and all other steps in your pipeline to cryptographically sign every image they process ○ Ensure every environment (including production!) that will run your images checks for a valid signature from the required sources. Container Image Security Takeaways