SlideShare a Scribd company logo
Container Security Management
Suresh Rupasinghe
Associate Tech Lead - WSO2
Cloud Native Technologies
What is a Container?
A standardized unit of software
● Lightweight
● Standalone
Cloud Native Security
Container Runtimes:
● Docker
● rkt
Comparing Containers and Virtual Machines
Container Virtual Machine
What is Kubernetes?
K8s is an open-source system
for automating deployment,
scaling, and management of
containerized applications.
Cloud Native Security
Traditional Approach vs. Modern Application Approach
Cloud Native Security
Demo
Containers & K8s Attack Vectors
Poisoned ImagesKernel Attack Denial of Service
Cloud Native Security
Container Breakouts Sniffing Secrets
The Attack Kill Chain
1. Recon
2. Weaponization
3. Delivery
4. Exploitation
5. Installation
6. Command & Control
7. Exfiltration
Cloud Native Security
Recent Attacks…!!!
Cloud Native Security
Container Security Stack
Container Security
Infrastructure
Pod Security Policies
Network Filtering
Secrets Management
Build
Code Analysis
Image Scanning
Deployment Check
Runtime
Anomaly Detection
Forensics
Run-Time Vulnerability Scanning
Cloud Native Security
Securing CI/CD Pipeline
Securing CI/CD Pipeline
Cloud Native Security
Docker
Hub
Sample Dockerfile & K8s Deployment file
Cloud Native Security
Securing CI/CD Pipeline
1. Image Scanning
● Clair by CoreOS
● Anchore
2. Code Analysis
3. Deployment Checks
● Kubesec.io
Cloud Native SecurityCloud Native Security
Infrastructure Layer Security
Infrastructure Layer Security
1. Pod Security Policies
● Kubernetes Pod Security Policy
Advisor
2. Network Filtering
● Cilium
Cloud Native SecurityCloud Native Security
Run-time Security
Run-time Security
1. Anomalous Behavior Detection
■ Falco
2. Runtime Vulnerability Scanning
3. Security Auditing
Cloud Native Security
OWASP Best Practices
RULE #0 - Keep Host and Docker up to date
RULE #1 - Do not expose the Docker daemon socket
RULE #2 - Set a user
RULE #3 - Limit capabilities (Grant only specific capabilities,
needed by a container)
RULE #4 - Add –no-new-privileges flag
Cloud Native Security
OWASP Best Practices -
RULE #5 - Disable inter-container communication (--icc=false)
RULE #6- Use Linux Security Module (seccomp, AppArmor, or SELinux)
RULE #7 - Limit resources (memory, CPU, file descriptors, processes, restarts)
RULE #8 - Set filesystem and volumes to read-only
RULE #9 - Use static analysis tools
RULE #10 - Set the logging level to at least INFO
Cloud Native Security
Secret Management
Kubernetes Level
● Kubernetes secret
● HashiCorp Vault
Source Code Level
● Helm Secrets
● Sealed Secrets
Cloud Native Security
References:
● https://cheatsheetseries.owasp.org/cheatsheets/Docker_Security_Cheat_Sheet.html#rule-1---do-n
ot-expose-the-docker-daemon-socket-even-to-the-containers
● https://www.youtube.com/channel/UCvqbFHwN-nwalWPjPUKpvTA
● https://istio.io/
● https://www.youtube.com/watch?v=Jbqxsli2tRw
● https://www.youtube.com/watch?v=15bsTualHnA
● https://www.youtube.com/watch?v=Uocf67aD5QQ
● https://www.openpolicyagent.org/
● https://spiffe.io/
Q&A
THANK YOU

More Related Content

PDF
Securing your Kubernetes applications
PDF
Implementing Active Security with Sysdig Falco - Barcelona Software Crafters
PDF
Implementing Active Security with Sysdig Falco - Docker Meetup Barcelona
PPT
Container security
PDF
Container Security Deep Dive & Kubernetes
PDF
Incident Response in Cyber-Relevant Time - OpenC2
PPTX
Equifax cyber attack contained by containers
PPTX
Hug #9 who's keeping your secrets
Securing your Kubernetes applications
Implementing Active Security with Sysdig Falco - Barcelona Software Crafters
Implementing Active Security with Sysdig Falco - Docker Meetup Barcelona
Container security
Container Security Deep Dive & Kubernetes
Incident Response in Cyber-Relevant Time - OpenC2
Equifax cyber attack contained by containers
Hug #9 who's keeping your secrets

What's hot (20)

PDF
All Your Containers Are Belong To Us
PDF
Security threats with Kubernetes - Igor Khoroshchenko
PDF
Stop disabling SELinux!
PPTX
Kali presentation
PDF
Secure and Simple Sandboxing in SELinux
PDF
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
PDF
(03 2013) guide to kali linux
PPTX
Kali Linux - Falconer
PDF
Principles of Monitoring Microservices
PDF
Monitoring & Securing Microservices in Kubernetes
PDF
Are Your Containers as Secure as You Think?
PDF
penetration test using Kali linux ppt
PDF
Anatomy of a Cloud Hack
PDF
What is Google Cloud Good For at DevFestInspire 2021
PPTX
Lacework | Top 10 Cloud Security Threats
PPTX
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
PDF
Malware Collection and Analysis via Hardware Virtualization
PDF
Kubernetes - Security Journey
PDF
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
PPTX
Shamsa altayer 10bg kali linux
All Your Containers Are Belong To Us
Security threats with Kubernetes - Igor Khoroshchenko
Stop disabling SELinux!
Kali presentation
Secure and Simple Sandboxing in SELinux
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
(03 2013) guide to kali linux
Kali Linux - Falconer
Principles of Monitoring Microservices
Monitoring & Securing Microservices in Kubernetes
Are Your Containers as Secure as You Think?
penetration test using Kali linux ppt
Anatomy of a Cloud Hack
What is Google Cloud Good For at DevFestInspire 2021
Lacework | Top 10 Cloud Security Threats
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Malware Collection and Analysis via Hardware Virtualization
Kubernetes - Security Journey
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Shamsa altayer 10bg kali linux
Ad

Similar to Container Security Mmanagement (20)

PDF
Cloud-Native Security
PDF
Cloud Native Security: New Approach for a New Reality
PDF
The Art of Cloud Native Defense on Kubernetes
PDF
Securing Microservices in Containerized Environments
PPTX
Kubernetes and container security
PDF
GDG SLK - Why should devs care about container security.pdf
PDF
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
PDF
KubeHuddle NA 2023 - Why should devs care about container security - Eric Sma...
PPTX
Security for cloud native workloads
PPTX
Understanding container security
PDF
DCSF19 Container Security: Theory & Practice at Netflix
PDF
Python Web Conference 2022 - Why should devs care about container security.pdf
PDF
Why Should Developers Care About Container Security?
PDF
ATO 2022 - Why should devs care about container security.pdf
PDF
Container Stranger Danger - Why should devs care about container security
PDF
Bridging The Cloud and Application Security Gaps Meetup 15102024
PPTX
Containers and workload security an overview
PDF
Chaos engineering for cloud native security - Chaos Carninval 2021
PDF
Container Security
PDF
Here Be Dragons: Security Maps of the Container New World
Cloud-Native Security
Cloud Native Security: New Approach for a New Reality
The Art of Cloud Native Defense on Kubernetes
Securing Microservices in Containerized Environments
Kubernetes and container security
GDG SLK - Why should devs care about container security.pdf
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
KubeHuddle NA 2023 - Why should devs care about container security - Eric Sma...
Security for cloud native workloads
Understanding container security
DCSF19 Container Security: Theory & Practice at Netflix
Python Web Conference 2022 - Why should devs care about container security.pdf
Why Should Developers Care About Container Security?
ATO 2022 - Why should devs care about container security.pdf
Container Stranger Danger - Why should devs care about container security
Bridging The Cloud and Application Security Gaps Meetup 15102024
Containers and workload security an overview
Chaos engineering for cloud native security - Chaos Carninval 2021
Container Security
Here Be Dragons: Security Maps of the Container New World
Ad

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Big Data Technologies - Introduction.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
A Presentation on Artificial Intelligence
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Cloud computing and distributed systems.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Big Data Technologies - Introduction.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25-Week II
Programs and apps: productivity, graphics, security and other tools
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A Presentation on Artificial Intelligence
The AUB Centre for AI in Media Proposal.docx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Cloud computing and distributed systems.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Container Security Mmanagement