Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Security in a container based world

Laura Bell
September 04, 2015

Security in a container based world

Presented at Microsoft Ignite NZ 2015 by Laura Bell

Laura Bell

September 04, 2015
Tweet

More Decks by Laura Bell

Other Decks in Technology

Transcript

  1. In this talk Container Fundamentals Some important points that are

    worth refreshing Prevention Avoid common vulnerabilities and avoid mistakes Detection Prepare for survival and response
  2. !=

  3. TL;DR Container Fundamentals Some important points that are worth refreshing

    Prevention Avoid common vulnerabilities and avoid mistakes Detection Prepare for survival and response
  4. Prevention Check your privilege Principle of least privilege at all

    stages Use trusted sources Not all container images are equal Vulnerability management and updates Prepare for survival and response Isolate your containers Principle of least privilege at all stages Layer your defenses Principle of least privilege at all stages
  5. Detection Monitoring and Logging Log and monitor all layers of

    your deployment architecture Seek Assurance Get appropriate penetration testing of both application and infrastructure components
  6. Securing Microservice Architectures Thursday 10:40am Find me later at… § 

    Hub Happy Hour Wed 5:30-6:30pm §  Hub Happy Hour Thu 5:30-6:30pm §  Closing drinks Fri 3:00-4:30pm 1 2 3 4 5 6
  7. © 2015 Microsoft Corporation. All rights reserved. Microsoft, Windows and

    other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.