Secure Your Containers Like Your Apps Depend On It

By : Yaffa Finkelstein | Thursday, October 22 2020 - 10:35 IWST

Yaffa Finkelstein - Product Marketing Manager, Check Point Software Technologies (Photo by Linkedin)
Yaffa Finkelstein - Product Marketing Manager, Check Point Software Technologies (Photo by Linkedin) - This goes out to the security experts who are tirelessly pursuing security, through the cloud evolution and into the agile world of Kubernetes and containers. Today we’ll share some of the container security concerns which you might not have considered until now, and we’ll explain how to mitigate those risks, without imposing on your agile DevOps teams.

Here are the top questions you should ask yourself, as you assess the ability of your container security solution to keep your applications safe:

1. How can you secure it if you can’t see it?

If you want to ensure that your app remains safe, you need to make sure that you can quickly pull up a visualisation of all of your assets and the relationships between them. Make sure that you can quickly identify whether there is any anomalous traffic activity at a glance.

2. Industry security benchmarks are important but what about the organisation’s security policies?

Beyond complying with security best practices and regulatory requirements such as NIST & CIS benchmarks, make sure that you have the ability to create custom compliance rules so that you can auto-enforce corporate governance on a granular level even in a dynamic container environment, without distracting DevOps.

3. How far-left can you shift the security practice? Shift-left further!

To prevent the inevitable frustrations that come with security that isn’t integrated into DevOps pipelines, you need a CI tool that will scan container images before code is even committed. It’s the only way to ensure that your code remains security-centric and it aligns all stakeholders with your objectives – to keep workloads safe from exploits.

4. What are the hidden dangers of labelling and cluster operations management?

Misused container labels can inadvertently create security holes and while labeling provides a number of advantages within a dynamic microservices environment, this can be exploited with malicious intent. Always make sure that you have the ability to set security policies and guardrails for cluster operations, and to enforce least privilege access rights. Consider creating rule based access control for labelling, to keep a handle on who has access to the different parts of the architecture.

5. Can you block malicious attacks on a container in runtime?

Yes, you most certainly can, if you have a runtime agent that is able to continuously scan for vulnerabilities, and that can identify malicious behaviour in real time. The only way to ensure the integrity of every container is to deploy a solution that you know can detect and block incidents in real time.

While these are the key questions you should be asking yourselves, we also have a path to help them move forward. First, in order to provide strong runtime security and application control for your containers, you need to determine your baseline behavior at the application layer. You can do this by running a security assessment of your container environment to discover hidden threats and misconfigurations that could be placing your organisation in jeopardy.

Second, set up a time with a cloud DevSecOps expert to review your assessment and outline a path for automating security and posture management directly into your dev cycle. You should also be able to have more context and for the first time be able to visualise your network map and understand the different container resources accessing each other.

The goal of these next stages is to provide a holistic understanding of all of the moving parts in order to secure the entire application. Onboarding a container security solution is simple, and when integrated into your CI/CD pipeline, even easier. And by taking this leap, you can finally move away from a monolith mentality when it comes to security of your containers and other microservices into one that is automated and better aligned to protect against modern threats. You can be the super hero of your DevSecOps team!

News Comment

Today's Industry

Ilustration Hackers (Photo by

Jumat, 30 Oktober 2020 - 11:20 WIB

Organisations Paid Hackers US$23.5 Million for These 10 Vulnerabilities in One Year

HackerOne report reveals cross-site scripting, improper access control, and information disclosure top list of most common and impactful vulnerabilities.

Clean Earth Technologies (CET)

Jumat, 30 Oktober 2020 - 10:30 WIB

Clean Earth Technologies’ New Class Of Polymers Invented By Associate Professor, Justin Chalker, Receives Australian Pm’s New Innovator Award

Associate Professor Justin Chalker has invented a novel class of polymers synthesised directly from elemental sulphur which is a waste by-product of the petrochemical industry and renewable…

SMILE to Empower Smallholders

Kamis, 29 Oktober 2020 - 08:35 WIB

Kao Corporation, Apical & Asian Agri Join Hands to Empower Smallholders with SMILE Program

SMILE or the SMallholder Inclusion for better Livelihood & Empowerment program to help independent oil palm smallholders in Indonesia improve their yields, acquire international certification,…

Industrial Area Ilustration

Rabu, 28 Oktober 2020 - 08:40 WIB

CFLD Develop a Strategic Industrial Area which is Supported by Seven New Infrastructures

Segye ASEAN Forum 2020 which is a series of Indonesian and Korean Manufacturing Industry Partnership forum events held, was attended virtually by more than 500 executives from well-known manufacturing…

Hilton – Asia Pacific (Photo by Hilton Asia Pacific - Posts | Facebook)

Selasa, 27 Oktober 2020 - 15:40 WIB

Waldorf Astoria to Debut in Japan with Milestone Signing In Tokyo

Set to open in 2026, Waldorf Astoria Tokyo Nihonbashi to Offer Timeless Luxury and Unrivaled Service in Japan’s Cultural Capital.