$30 off During Our Annual Pro Sale. View Details »

Security in a container based world

Laura Bell
September 04, 2015

Security in a container based world

Presented at Microsoft Ignite NZ 2015 by Laura Bell

Laura Bell

September 04, 2015
Tweet

More Decks by Laura Bell

Other Decks in Technology

Transcript

  1. View Slide

  2. Security in a Container
    based World
    Laura Bell (@lady_nerd) M255

    View Slide

  3. View Slide

  4. Modern

    View Slide

  5. caution:
    fast paced field ahead
    watch for out of date content

    View Slide

  6. here

    View Slide

  7. In this talk
    Container Fundamentals
    Some important points that are worth refreshing
    Prevention
    Avoid common vulnerabilities and avoid mistakes
    Detection
    Prepare for survival and response

    View Slide

  8. View Slide

  9. !=

    View Slide

  10. View Slide

  11. do not

    View Slide

  12. container implementations vary

    View Slide

  13. https://www.opencontainers.org/

    View Slide

  14. View Slide

  15. Check your privileges

    View Slide

  16. there's no user ID isolation

    View Slide

  17. root-level privileges

    View Slide

  18. as soon as possible

    View Slide

  19. this may be easier said than done

    View Slide

  20. Use trusted sources

    View Slide

  21. a trusted source

    View Slide

  22. prebuilt containers and apps

    View Slide

  23. helps with trust

    View Slide

  24. decide
    run

    View Slide

  25. Vulnerability Management
    and Updates

    View Slide

  26. View Slide

  27. system
    applications
    services
    software

    View Slide

  28. View Slide

  29. Isolate your containers

    View Slide

  30. View Slide

  31. (and manage it as such)

    View Slide

  32. essentials only

    View Slide

  33. Defense at every layer

    View Slide

  34. the most likely attack vector

    View Slide

  35. View Slide

  36. Monitoring your environment

    View Slide

  37. like actually,
    for real,
    not just when you’re debugging

    View Slide

  38. Virtualization layer
    Application
    Components

    View Slide

  39. impact of
    compromise

    View Slide

  40. Seek assurance

    View Slide

  41. require frequent assessment
    by someone who understands the tech

    View Slide

  42. View Slide

  43. View Slide

  44. TL;DR
    Container Fundamentals
    Some important points that are worth refreshing
    Prevention
    Avoid common vulnerabilities and avoid mistakes
    Detection
    Prepare for survival and response

    View Slide

  45. Prevention
    Check your privilege
    Principle of least privilege at all
    stages
    Use trusted sources
    Not all container images are
    equal
    Vulnerability management
    and updates
    Prepare for survival and
    response
    Isolate your containers
    Principle of least privilege at all
    stages
    Layer your defenses
    Principle of least privilege at all
    stages

    View Slide

  46. Detection
    Monitoring and Logging
    Log and monitor all layers of
    your deployment architecture
    Seek Assurance
    Get appropriate penetration
    testing of both application and
    infrastructure components

    View Slide

  47. Container Security Cheat sheet
    Docker Security Benchmark Tool

    View Slide

  48. Securing Microservice
    Architectures
    Thursday 10:40am
    Find me later at…
    §  Hub Happy Hour Wed 5:30-6:30pm
    §  Hub Happy Hour Thu 5:30-6:30pm
    §  Closing drinks Fri 3:00-4:30pm
    1
    2
    3
    4
    5
    6

    View Slide

  49. Subscribe to our fortnightly newsletter
    http://aka.ms/technetnz http://aka.ms/msdnnz
    http://aka.ms/ch9nz
    Free Online
    Learning
    http://aka.ms/mva
    Sessions on Demand

    View Slide

  50. View Slide

  51. © 2015 Microsoft Corporation. All rights reserved.
    Microsoft, Windows and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
    MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

    View Slide