In our on-demand webinar with Bryan Cross (GitHub) and Dave Meurer (Synopsys), you’ll learn how to use integrated application security tools to secure containers at every layer.
Open source is the foundation of most modern applications. However, left untracked, open source can put containerized applications at risk of known vulnerabilities such as Heartbleed and CVE-2017-5638 found in Apache Struts.
Containers have restructured the way we think about our infrastructure, bringing development and operations teams closer together than ever before, and placing applications center stage in the infrastructure environment. Teams are massively scaling containerized deployments with Kubernetes and Kubernetes-based solutions, like Red Hat’s enterprise-grade container orchestration platform, OpenShift Container Platform. But in containerized deployments, because applications sit closer to the infrastructure, without an intervening hypervisor and host OS, application security is more important than ever. In fact, security remains among the most important barriers to container adoption. Black Duck fills a container security void Last November we announced the launch of our infrastructure security product, OpsSight, to bring open source visibility and control to operations teams managing large-scale container deployments with OpenShift and Kubernetes. OpsSight automatically scans every image, as it is used by the cluster, for open source and associated vulnerabilities. It then annotates the pod with metadata to highlight any policy violations. This information enables teams to ensure that vulnerable containers are not allowed to run in production. Finally, OpsSight continuously monitors for any newly reported vulnerabilities that may affect the contents of running containers, alerting teams so they can find and fix those vulnerabilities before a hacker might exploit them. In this solution, Black Duck created the first proactive security solution that could scale with the realities of containerized deployments. Container technology moves lightning fast The world of container orchestration and Kubernetes is rapidly changing. Recently, Red Hat released OpenShift Container Platform 3.9. In this latest release, Red Hat stepped up security and usability with a new central auditing capability, console timeouts, and improved service catalog workflows. Additionally, OpenShift can now preserve data across more environments, including PostgreSQL, MariaDB, and MySQL; it advances device plugin support and grows the types of local storage that are supported. Check out the OpenShift Commons Briefing on OpenShift Container Platform 3.9 for a full run-through. Enter OpsSight 2.0 Container Security solution Black Duck too has evolved our container security solution to meet the needs of our customers. Today we are announcing OpsSight 2.0. This new version has the same important security features as its older brother but has been re-architected to better scale and maintain support for the latest and greatest in container orchestration, like OpenShift Container Platform 3.9 and Kubernetes 1.10. OpsSight 2.0 also features:
Companies are leveraging containers on a massive scale to rapidly package and deliver software applications. But because it is difficult for organizations to see the components and dependencies in all their container images, container security risks associated with containerized delivery has become a hot topic in DevOps. This puts the spotlight on operations teams to find security vulnerabilities in the production environment.
As application development teams are pressured to deliver software faster than ever, containers offer clear advantages. Docker debuted to the public in 2013, and since then there have been over 29 billion Docker container downloads. Benefits of containerization
Do you know what’s in your containers? No, the question has nothing to do with those mystery containers in your fridge. But if you don’t know what’s in those lovely Docker containers which are all the rage, you could be in store for just as rude a surprise as discovering what might be hiding deep in your fridge.
Posted in Container Security | Comments Off on Using containers? What’s hidden in your container images?
Today, open source components are at the heart of most modern applications, transforming how we architect solutions in every industry. Black Duck’s 2017 Open Source Security and Risk Analysis of over 1000 commercial applications revealed that 96% of applications scanned utilized open source. Meanwhile, more than 60% of those applications contained known security vulnerabilities in their open source components, and on average, vulnerabilities identified in these applications have been publicly known for over four years.
Before Black Duck began leveraging Docker, customers utilized the App Manager Install Method to deploy it. Black Duck now deploys as a set of containers, so customers need to install Docker to take advantage of updates to the application. By the end of this guide, you’ll have a basic understanding of how to migrate Black Duck to a containerized environment, as well as the benefits of using containers.
Get started with the Dockerized Black Duck installation. This post outlines workplace specifications, tools, and steps you’ll take to deploy Black Duck.
Organizations today work in a continuous delivery environment, requiring speed and agility in deployment and the ability to monitor applications once deployed. These requirements are accelerating the adoption of containers in the production environment. In October, DockerCon Europe revealed that 24 billion containers have been downloaded. Not surprisingly, there’s been a corresponding 77,000% growth in Docker job listings. Why use containers? As application development teams are pressured to deliver software faster than ever, container adoption offers clear advantages. A Forrester study found that 66% of organizations who adopted containers experienced accelerated developer efficiency, while 75% of companies achieved a moderate to significant increase in application deployment speed. Got a lot of containers to secure? Download the eBook. As the saying goes, time is money. As development and operations teams deliver software without the hassle of constantly reconfiguring infrastructure, they save time and cut costs. In a different study, Forrester discovered that organizations saved upward of 70% on dev/test costs after container adoption, and 40% on production costs, while operating on 80% fewer servers. Similarly, case studies revealed that organizations who adopted containers experienced average cost savings of 50% in the production environment. Since containers do not require hypervisors, much of these savings come from a reduction in hypervisor licensing costs.