How to Secure AWS Containers and Use ECS for Container Security
AWS containers are growing rapidly in popularity but how to secure containers in production is still a new topic. In this video from AWS re:Invent Henrik Johansson and Michael Capicotto present how to secure containers on AWS and use AWS ECS for security and governance. We also provide a summary below.
Containers have had an incredibly large adoption rate since Docker was launched, especially from the developer community, as it provides an easy way to package, ship, and run applications. Securing your container-based application is now becoming a critical issue as applications move from development into production. In this session, you learn ways to implement storing secrets, distributing AWS privileges using IAM roles, protecting your container-based applications with vulnerability scans of container images, and incorporating automated checks into your continuous delivery workflow.
Here’s a summary of the presentation:
Container Security Best Practices. Although containers are not as mature from a security and isolation perspective as VMs, they can be more secure by default.
- Run containers on top of virtual instances
- Segregate containers
- Reduce container attack surface area
- Follow container security best practices such as limiting resource consumption, networking, and privileges
- Consider third party security such as NeuVector to visualize behavior and detect abnormal connections[
- Use built-in ECS security options such as SELinux support.
Container Lifecycle Security. Build in security throughout the lifecycle of containers, from development to build and test to production.
- Do vulnerability analysis and allow only approved images during build
- Own your own repo and regularly analyze images
- Only allow compliant images to run in production
- Have runtime defence in place
- Use tools such as Docker Bench with Lambda to automate security checks
- Build security into the entire CI/CD process including runtime.
Managing Secrets. Be careful about embedding secrets into images or environment variables which are visible from many places.
- Use S3-based secrets storage by using an environment variable enforced by IAM policies
- Use third party secrets management solutions or build your own using S3.
- Enforce Governance with ECS. ECS tasks enable you to manage containers and define communication between containers
- Use task definitions to control images, CPU/memory, links, ports, and IAM roles
- Use the new IAM roles definition to isolate credentials and authorization between tasks.
Using Containers to Automate Security Deployments. Governance can be achieved during continuous integration, by enabling the security teams to deploy security containers as part of the process.
- Enable the security team to deploy security containers such as host intrusion detection in parallel
- Use an automation tool like Jenkins to build both application and security containers, merge both task definitions and then deploy using ECS
- Allow security teams to deploy security without having to bake it into the application image.
The benefit of being able to integrate security into the CI/CD process is that accidental conflicts are removed, developers and security teams can operate independently, and controls are more logically defined and enforced.
NeuVector provides an application and network aware container security solution which you can easily test drive and deploy, even on running applications.
- Container Security
- Cloud Security
- Docker Security
- Kubernetes Security
- Press Releases
- Container Threats
- Network Security
- Container Networking
- Container Firewall
- RedHat OpenShift
- cloud-native security
- Ebooks + Guides
- data loss prevention
- security automation
- service mesh
- Cloud services
- Cyber Attacks
- Kubernetes system
- NeuVector Product
- AWS ECS
- CIS Benchmark
- Customer Stories
- Infrastructure as Code
- Open Source
- PCI Compliance
- Slider Ebooks & Guides
- security mesh
- shift left
- App Mesh
- Black Duck Software
- Docker Hub
- Docker Networking
- Docker container firewall
- Financial Services
- IBM Cloud
- Internet of Things
- VMware Photon
- Virtual Patching
- admission control
- application security
- container risk score
- cpu optimization
- data breach
- real-time containers
- sensitive data