Are the built-in security controls of Docker ‘good enough’?
FEI HUANG Container Security Docker Security Leave a Comment
Editor’s note: This post was originally published on dabcc.com
When deploying Docker containers into production here’s a frequently asked question:
“Are the built-in security controls of Docker ‘good enough’ for my service?”
There’s been quite a few posts recently assessing the security requirements for containerdeployments and taking a stand one way or another. A blog post on Docker’s blog asserts that “Your Software is Safer in Docker Containers.” And in a recently published paper, the Gartner group says:
“Containers managed by Docker are effective in resource isolation.”
However, VMware has taken a position that containers are safer when they’re running on a virtual machine.
Of course, the real answer is that ‘it depends.’ It depends on the requirements of your service and the risk you’re willing to take if it’s compromised. While simple isolation and built-in security features may be adequate for most applications, it may not be appropriate for business critical services. Does your business rely on these containers for critical processes? Are these services publicly accessible? Will an attacker be able to get to sensitive privacy or account data?
Container deployments are in the early phases for most companies, and the attack vectors and threat surfaces are not fully known at this time. But just like what we went through with virtualization, and datacenter servers before that, real-time protection for running containers is going to be needed as the last line of defense against hackers who can, and will, get through traditional controls.
There aren’t many companies focusing on this aspect of container security yet. NeuVector is one of those which offers run-time application centric protection for containers. This is especially timely given that the promised benefits of containers include rapid deployment and scale, and these can’t be reduced by cumbersome traditional security tools.
NeuVector’s solution is now available to try and deploys in minutes just like any other containers.
Categories
- Container Security (75)
- Cloud Security (35)
- Docker Security (30)
- Kubernetes Security (26)
- Press Releases (21)
- Container Threats (18)
- Network Security (18)
- Articles (14)
- Kubernetes (13)
- Vulnerabilities (13)
- Container Networking (8)
- Container Firewall (7)
- Exploits (7)
- RedHat OpenShift (7)
- cloud-native security (7)
- AWS (6)
- Partnerships (6)
- Alerts (4)
- Ebooks + Guides (4)
- data loss prevention (4)
- security automation (4)
- service mesh (4)
- Cloud services (3)
- Compliance (3)
- Cyber Attacks (3)
- Kubernetes system (3)
- Microservices (3)
- NeuVector Product (3)
- Serverless (3)
- dlp (3)
- AWS ECS (2)
- CI/CD (2)
- CIS Benchmark (2)
- Customer Stories (2)
- Docker (2)
- Infrastructure as Code (2)
- Istio (2)
- Open Source (2)
- PCI Compliance (2)
- PCI-DSS (2)
- Slider Ebooks & Guides (2)
- Terraform (2)
- VMware (2)
- run-time (2)
- security mesh (2)
- shift left (2)
- waf (2)
- Alibaba (1)
- App Mesh (1)
- Backdoor (1)
- Banking (1)
- Black Duck Software (1)
- Docker Hub (1)
- Docker Networking (1)
- Docker container firewall (1)
- ECS (1)
- EKS (1)
- Events (1)
- Financial Services (1)
- GDPR (1)
- IBM Cloud (1)
- Internet of Things (1)
- JFrog (1)
- Jenkins (1)
- Knative (1)
- OpenShift (1)
- Secrets (1)
- VMware Photon (1)
- Virtual Patching (1)
- Webinar (1)
- admission control (1)
- application security (1)
- container risk score (1)
- cpu optimization (1)
- crypto (1)
- data breach (1)
- dpi (1)
- grafana (1)
- linkerd2 (1)
- micro-perimeter (1)
- monitoring (1)
- pci (1)
- prometheus (1)
- rancher (1)
- real-time containers (1)
- sdlc (1)
- sensitive data (1)