DevOps security improvements through effective use of container technology
Murray Goldschmidt
Cyber Security: A Peer-Reviewed Journal, 2018, vol. 2, issue 3, 219-227
Abstract:
The move toward cloud-native deployments will diminish the use of traditional server-based, hypervisor-driven virtualisation that delivers virtual machines (VM). As a result, the adoption of application-centric, container-based virtualisation will escalate. Containers and VMs are similar in their goals: to isolate an application and its dependencies into a self-contained unit that can run anywhere.1 Since cloud deployments are heavily geared towards agility, optimisation and automation, container-based technologies are riding the wave of rapid adoption, particularly in DevOps-oriented environments. Containers provide great flexibility for DevOps teams to tool up for frictionless service delivery life cycles. This presents an almost unprecedented opportunity to embed security into the software delivery pipeline, rather than graft on security checks, container monitoring and policy for access controls as an afterthought.2 Containers are not without problems, however. From a security perspective, if left unchecked, the technology is susceptible to many issues including supply chain risks and many forms of vulnerabilities originating from poor configuration and operational management. This could result in production environment compromise through targeted cyberattacks. This paper addresses the key activities to achieve hygiene in high-velocity, security-focused DevOps deployments.
Keywords: container security; docker; micro services; container; containerisation; DevOps; DevSecOps; cyber security; SDLC; secure development life cycle; service delivery life cycle; kill chain; hacking; web application security; vulnerability management; virtualisation; virtual machine (VM) (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2018
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/4437/download/ (application/pdf)
https://hstalks.com/article/4437/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2018:v:2:i:3:p:219-227
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().