Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Introduction to the containerization security

Introduction to the containerization security

Slides of the talk "Introduction to the containerization security" - HCT UAE

Nebrass Lamouchi

November 25, 2018
Tweet

More Decks by Nebrass Lamouchi

Other Decks in Technology

Transcript

  1. Agenda • Introduction to Containers • What is Docker? •

    Docker Architecture • How containers can improve security ?
  2. Nebrass? Ø Technical Leader at Ø Member of the Oracle

    NetBeans Dream Team Ø OWASP Project Leader since March 2013 Ø Two Books author J Ø @NebrassLamouchi Ø github.com/nebrass
  3. Containers • LXC (Linux Containers) is an operating-system-level virtualization method

    for running multiple isolated Linux systems (containers) on a control host using a single Linux kernel. • The Linux kernel provides the CGroups functionality that allows limitation and prioritization of resources (CPU, memory, block I/O, network, etc.) without the need for starting any virtual machines, and namespace isolation functionality that allows complete isolation of an applications' view of the operating environment, including process trees, networking, user IDs and mounted file systems.
  4. Containers • Containers are a new, lightweight way to insure

    the same functionnalities covered by the virtualization in a lighter way. Virtualization Containers
  5. What is Docker? • Docker is an open-source project that

    automates the deployment of applications inside software container. • Docker containers wrap up a piece of software in a complete file system that contains everything it needs to run: code, runtime, system tools, system libraries – anything you can install on a server. • This guarantees that it will always run the same, regardless of the environment it is running in.
  6. • Containers are easier to be deployed and orchestrated for

    High Availability. • We can control the OS User executing the application in the Container. • Containers are easier to be scanned in matter of security exploits. • Containers are a perfect building block for immutable infrastructure. • Containers access can be easily controlled, monitored and optimized thru the hosting infrastructure. • Containers catalog highlights certified containers images to garantee the origin of the image.