当前位置:网站首页>Battle Atlas: 12 scenarios detailing the requirements for container safety construction

Battle Atlas: 12 scenarios detailing the requirements for container safety construction

2022-07-07 13:44:00 InfoQ

More and more enterprises begin to adopt containerized cloud native applications , From the first container application development to the process of managing thousands of containers , Security needs are also changing . therefore , Enterprises in different application stages need a clear battle map , Indicates that in the process of containerization , How to do a good job in safety construction at all stages . The following is the best battle map and solution summarized by enterprises in different application stages in actual combat , To find the safety requirements of containers in different stages .

12 Large scene container safety operation atlas

null
null
null

One stop container security solution

The enterprise security requirements battle map for the different containerization application stages described above , It is the best practice summarized by enterprises according to practical application . Next , Let's learn more about the specific application solutions of these two enterprises .

1、 Background and challenges
A Customer : A manufacturing enterprise —— The initial stage of container application
In order to better adapt to the flexible changes and flexible expansion of business . The customer put the containerized application into production , But it also brings its own threat vector . At this time, a core problem is cognitive bias , From developers to security experts accustomed to using traditional tools , Few people fully understand what potential safety problems may occur in containers , It also makes customers face unprecedented security challenges .
Major security challenges
  • Vulnerability management is difficult :
    In the development process , The most important part of vulnerability management is image scanning . Some scanning tools can only find operating system vulnerabilities and vulnerabilities that only exist in certain languages , Some cannot scan every image layer or some open source software packages .
  • Low efficiency of compliance management :
    Team members manage configuration manually , It is not only inefficient but also prone to mistakes , Customers need tools that automatically perform configuration checks to improve security and reduce operational workload .
  • Lack of runtime security :
    After the application is put into production , Must be able to detect abnormal behavior in the application , This may be a precursor to a security incident .

B Customer : A joint-stock bank —— Container application advanced stage
With the continuous deepening of Yunyuan biochemical Application , The customer containerized more applications . At this time , The technology stack involved in containerization is constantly enriched , The number of engineers and teams is increasing . here , Complexity becomes the main problem . Complexity not only challenges security , It will also bring challenges to incident response and compliance . Therefore, the importance of visibility and automatic configuration management has multiplied , Customers need to simplify the development and operation process , And realize the automatic operation of repetitive work .
Major security challenges
  • Automation is crucial :
    As companies deal with more and more clusters , Automation has become particularly important , Customers need to achieve unified security policy management through automated tools .
  • More complex compliance requirements :
    In the mature stage of container application , It is important to track , Customers need to know which applications or microservices need to meet what compliance requirements , And effectively check whether it meets the compliance requirements .
  • Service isolation and segmentation :
    As the number of services increases and the compliance and security ecosystem becomes more and more complex , Proper flow isolation and segmentation between services is critical .

2、 Solution
Since the container runs very fast , Safety should be introduced into the container life cycle as early as possible ,
Embed security into the build 、 Deploy and run the entire container lifecycle , Achieve the development stage — Safe left shift and operation phase — Adaptive security .
null
01  Construction phase
Security image scanning
Scan through container image , Detect whether there are common vulnerabilities and risks (CVE), Reduce the attack surface of the final container image . The correct mirror scanning includes the following levels :
  • Perform a mirror scan , Check whether there are known third-party vulnerabilities in the root image and open source image libraries .
  • Statically scan the configuration and deployment scripts , Early detection of misconfiguration problems , And scan the deployed image for dynamic infrastructure reinforcement .

Observe application behavior
Observe the microservice architecture during development and integration , Know what is normal behavior , This helps in threat modeling . In production , Detect abnormal behavior through threat model , In isolation .
02  Distribution phase
Review known content
The container security system needs to verify the container image when passing through the container image warehouse , Once non-compliance is found , It is necessary to intercept and isolate relevant images .

Review the risk score
Generate a risk score for each container image of each checkpoint , Standardize container life cycle , And set the minimum safety threshold for each important checkpoint , If the minimum level is not reached , The container life cycle will be controlled .
03  Deployment phase
Automatic deployment
Link the container security scheme with the deployment system , Realize unified security policy management , For the written 、 Code that supports automated deployment tasks is scanned and validated , Find vulnerabilities in the code .

Security infrastructure
Deploying a vulnerability free container on the host will still pose a security risk , Relevant reinforcement best practices need to be implemented , for example , With  CIS  Benchmark or company reinforcement strategy , Check for deviations from reinforcement best practices .

Log data audit
Through complete 、 Comprehensive log data audit trail , When safety risks occur, specific reasons can be investigated , And take remedial measures and implement new security strategies accordingly .

04  Operation phase
Workload inventory and visualization
Fully automated 、 Fine grained analysis of workloads , And visualize the network access behavior between workloads .

Micro isolation
Using micro isolation can control the network access of containers , And emergency response , When something goes wrong , Isolation can be used to prevent further spread of the threat .

Intrusion detection and response
Provide behavior based detection capability with multiple anchors , It can accurately detect the unique escape behavior of containers 、 be based on K8S Aggressive behavior of 、 Mining in containers 、 Horizontal penetration and other behaviors , At the same time, isolation containers are further provided 、 Kill files, etc .

Back analysis
Actively discover unknown threats through threat hunting , It's like cyberspace “ black box ”, Record various log data , It can be used to analyze various network security events , Trace the whole attack process .

3、 Customer revenue
Safety director of a manufacturing enterprise :
“ At first, we investigated many solutions , Now I'm especially glad that I chose the Ivy honeycomb container safety solution , After practice , Now the whole team recognizes its ability .”

01  Powerful image scanning ability
adopt CI Integrated plug-ins , Realization DevOps Image scanning capability , Compared with the traditional scanning tool process , It used to take nearly 1 Hours of vulnerability scanning is reduced to 6 minute , Efficiency improvement 10 times , The false alarm rate is significantly reduced , Reduce cost and increase efficiency .
02  Comprehensive container operation risk inspection
For running containers , On the one hand, the application is tested ,
Find application vulnerabilities ;
On the other hand, through nondestructive testing ,
Find the problem of weak password in application ,
Such as mysql、redis Weak password .
03  Flexible compliance baseline capabilities
Support 150+ Check the item , It can cover all inspection objects in the cluster ,
Baseline sampling ⽤ Mission check ⽅ type , Customers can flexibly target different inspection objects 、 Different business systems set flexible inspection tasks , To adapt to the complex enterprise environment .

The person in charge of security of a joint-stock bank :
“ We want to use fewer security tools , Solve as many security problems as possible . Choose Ivy honeycomb , Not only has the security capability covering the host and container levels , It can also realize data linkage with other security products , In addition to helping developers solve security problems , It also helps to improve the efficiency of the whole software development life cycle .”

01  Ultra fine grained asset inventory capability
Detailed inventory of ivy and honey comb assets 、 The comprehensive degree is far better than other similar solutions , In addition to the underlying assets 、K8S Assets are counted , just so so
For application assets and Web Make a detailed inventory of assets , Support 15 Class asset type ,1500+ The business should ⽤ distinguish .
02  Multi dimensional intrusion detection capability
Against known threats 、 A malicious act 、 Conduct comprehensive detection of abnormal behaviors , Provide behavior based detection capability with multiple anchors ,
For vulnerability escape 、 Trojans 、Webshell Such intrusion detection rate is much higher than other solutions .
03  Adaptive micro isolation capability
Ivy bee nest combs and learns through the interview relationship , Provide
⾃ Adaptive 、⾃ Migrated 、⾃ Maintenance of ⽹ Network isolation strategy ,
Provide business view ⻆ Of ⽹ Network topological relationship , Covering all kinds of cloud plains ⽣ The isolation strategy of the scene .
原网站

版权声明
本文为[InfoQ]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/188/202207071133167353.html