• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69

    Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69
  • Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24

    Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24
  • MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49

    MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49
  • Robolly Graphic Automation: Lifetime Subscription for $29

    Robolly Graphic Automation: Lifetime Subscription for $29
  • Animation Desk Windows Pro Lite: Lifetime Subscription for $59

    Animation Desk Windows Pro Lite: Lifetime Subscription for $59
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Yes, Containers Are Terrific, But Watch the Security Risks

May 23, 2022 by iHash Leave a Comment

Container Cybersecurity

Containers revolutionized the development process, acting as a cornerstone for DevOps initiatives, but containers bring complex security risks that are not always obvious. Organizations that don’t mitigate these risks are vulnerable to attack.

In this article, we outline how containers contributed to agile development, which unique security risks containers bring into the picture – and what organizations can do to secure containerized workloads, going beyond DevOps to achieve DevSecOps.

Table of Contents

  • Why did containers catch on so fast?
  • DevOps for the win… but security matters too
  • Containers introduce several security risks
  • Kernel security at the core of container security
  • Yet again, it comes down to patching
  • Always include security goals in your container ops

Why did containers catch on so fast?

Containers are, in many ways, the evolution of virtualization. The goal was to speed up the development process, creating a more agile route from development through to testing and implementation – a method that’s more lightweight than using full-blown virtual machines, anyway.

At the core of this issue is application compatibility, as applications require certain versions of libraries – which could clash with the requirements of other applications. Containers fixed this problem and happened to link up well with development processes and the management infrastructure that drives these processes.

Containers do their job by taking virtualization to the next level. Virtualization abstracts the hardware layer, whereas containers abstract the operating system layer, essentially virtualizing the role of the OS. Containerization works by packaging applications into “containers” that include all the necessary libraries to make an application work, while keeping applications unaware of each other as each app thinks it has the OS to itself.

Functionally, containers are quite simple – a container is just a text file with a description outlining which components should be included in an instance. This simplicity and the more lightweight nature of a container make it easy to use automation (orchestration) tools for deployment throughout the development lifecycle.

DevOps for the win… but security matters too

Containers have the power to significantly boost development efficiency – acting as the keys that unlock DevOps. That’s likely one of the major reasons why containers have caught on so broadly, with Gartner estimating that by 2023, 70% of organizations will be running containerized workloads.

The process of developing, testing, and deploying apps used to be filled with obstacles, with a constant back and forth between developers and the teams looking after infrastructure. Today, thanks to containers, developers can build and test in an environment that works and simply ship the finished code alongside a spec that defines that environment.

On the operational side teams merely execute this specification to create a matching environment that is ready to use. “Yes, but it works on my machine…” never helped fixed the problem – but today, that’s an expression developers no longer need to use because there are no environmental problems to debug.

So, yes, DevOps means rapid development. But there’s a missing component: security. This is why we’re increasingly hearing about DevSecOps as it evolves from DevOps because developers have noticed that the DevOps model alone does not sufficiently address security concerns.

Containers introduce several security risks

Containers simplify the development process but introduce complexity into the security picture. When you tightly pack an entire operating environment into a container only to distribute it widely you also increase the attack surface and open the door to different attack vectors. Any vulnerable libraries packaged with the container will spread these vulnerabilities across countless workloads.

There are several risks. One is a “supply chain attack” where a malevolent actor mounts an attack not by messing with your application, but by modifying one of the packages or components that is supplied with your application. So, teams looking after development efforts need to assess the application they are developing and every library pulled in as a dependency by the container configuration.

The risks to container security also involve the tools that enable containers – from Dockers though to orchestration tools such as Kubernetes, as these tools need to be monitored and protected. You shouldn’t, for example, allow sysadmins to run Docker containers as root. Likewise, you need to keep a close guard of your container registries to make sure that these aren’t compromised.

Kernel security at the core of container security

Some of the container-related security risks are less visible than others. Every container needs access to a kernel – after all, containers are just a type of advanced process isolation. But it is easy to miss the fact that all containers rely on the same kernel – it doesn’t matter that the applications inside the containers are segregated from each other.

The kernel that apps in a container see is the same as the kernel that the host relies on to operate. It brings a couple of issues. If the kernel on the host that supports the container is vulnerable to an exploit, this vulnerability may be exploited by starting an attack from an app inside a container.

So fact that the kernel is shared by all the containers on the host means that a flawed kernel must be patched rapidly, or all containers can quickly be affected by the vulnerability.

Yet again, it comes down to patching

Keeping the host’s kernel up to date is, therefore, an important step in ensuring safe and secure container operations. And it’s not just the kernel that needs patching, patches must be applied to the libraries pulled in by a container. But, as we know, consistently patching is easier said than done. That’s probably why one study found that 75% of containers analyzed contained a vulnerability that is classified as critical or high risk.

These vulnerabilities can lead to, for example, breakout attacks where an attacker relies on a flawed library within a container to be able to execute code outside of the container. By breaching one container the attacker can eventually reach their intended target whether that’s the host system or an application in another container.

In the context of containers maintaining secure libraries can be a real headache – somebody needs to track new vulnerabilities as well as what’s been patched and what hasn’t. The process is laborious, but it also requires specialist skills which is something your organization would need to acquire if it doesn’t have them already.

Given the value of regular, consistent patching those reasons shouldn’t be enough to cause the sort of hit-and-miss patching routines that we see, but – particularly when thinking about the OS kernel – the disruption of the required reboots and the associated need to maintain downtime windows can significantly delay patching. Live kernel patching helps mitigate this problem, but it’s not yet deployed by all organizations.

Always include security goals in your container ops

It’s common for cutting-edge tech to introduce new complications when it comes to information security. New tools commonly lead to new and novel exploits. That’s true for containers too and while it doesn’t undermine the overall value of using containers in your workloads it does mean that you need to keep an eye on the risks posed by containers.

Educating your developers and sysadmins about the common flaws in container security and the best practices that mitigate these flaws is a start. Patching is another important aspect. As always, putting in place the right steps to mitigate cybersecurity flaws will help protect your organization – and allow your team to benefit from that cutting-edge tech without suffering sleepless nights.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: computer security, Containers, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, hacker news, hacking news, how to hack, information security, network security, ransomware malware, risks, security, software vulnerability, Terrific, the hacker news, watch

Special Offers

  • Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69

    Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69
  • Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24

    Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24
  • MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49

    MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49
  • Robolly Graphic Automation: Lifetime Subscription for $29

    Robolly Graphic Automation: Lifetime Subscription for $29
  • Animation Desk Windows Pro Lite: Lifetime Subscription for $59

    Animation Desk Windows Pro Lite: Lifetime Subscription for $59

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

More Than You Know: The Enterprise Worth of Natural Language Generation 

Jun 24, 2022 By iHash

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

Jun 24, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69

Expires June 25, 2122 23:59 PST Buy now and get 22% off KEY FEATURES Create a smart home with the Eco4life Wireless Alarm Security System 4-Piece Kit. With this system, you can monitor your home and alert you of any activity through cell phones, smart devices, and home automation systems. Use the eco4life app to […]

Elastic Contributors: Announcing New Features and Ways to Earn Points

Elastic Contributors: Announcing New Features and Ways to Earn Points

Table of Contents What’s new?1. Additional opportunities to earn bonus points2. We accept code contributions made to non-Elastic repositories3. Extra points for referring a contributor4. Dispute declined contributions5. View other participants’ contributions What’s new? 1. Additional opportunities to earn bonus points Contributors can now earn bonus points for submitting content in different solutions and contribution […]

Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24

Expires June 24, 2122 23:59 PST Buy now and get 75% off KEY FEATURES Using advanced noise-reduction technology, Flux 7 TWS earphones have been designed to reduce unwanted noise during exercise. With an onboard 2,000mAh polymer lithium battery that offers 5 hours of standby time, Flux 7 TWS earbuds are ideal for fitness enthusiasts who […]

“Above the Trend Line” – Your Industry Rumor Central for 6/23/2022

Above the Trend Line: your industry rumor central is a recurring feature of insideBIGDATA. In this column, we present a variety of short time-critical news items grouped by category such as M&A activity, people movements, funding news, industry partnerships, customer wins, rumors and general scuttlebutt floating around the big data, data science and machine learning […]

NSO Confirms Pegasus Spyware Used by at least 5 European Countries

The beleaguered Israeli surveillanceware vendor NSO Group this week admitted to the European Union lawmakers that its Pegasus tool was used by at least five countries in the region. “We’re trying to do the right thing and that’s more than other companies working in the industry,” Chaim Gelfand, the company’s general counsel and chief compliance […]

Tagmate Tracker for Google Analytics 4 Tracking: Lifetime Subscription for $49

Expires September 21, 2022 23:59 PST Buy now and get 98% off KEY FEATURES If you’re a web developer, marketing agency, or product manager, you know how hard it is to set up Google Analytics 4 tracking on your site. Especially when we talk about custom events like CTA Buttons, Form Submissions, Banners, Impressions, and […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT