SlideShare a Scribd company logo
© 2018 Aqua Security Software Ltd., All Rights Reserved
Aqua Security
Cloud Native Security
2
The Leading Cloud Native Security Company
Aqua helps the world’s leading enterprises to modernize
security for their container-based, serverless and cloud native
applications, from development to production
Open Source Leadership
Maintaining the industry-standard tools
for container, Kubernetes and cloud
security
We “wrote the book” on K8s
security, and chair the CNCF
Technical Oversight Committee
Community Leadership
CloudSploit
Agenda
n Aqua’s Open Source Tools
n Kubernetes config with Kube-Bench
n Kubernetes penetration testing tool with Kube-Hunter
n Image scanning and CI integration with Trivvy
n Aqua Enterprise called Aqua CSP
n Runtime protection
n Container firewall
4
Aqua’s Open Source Tools
n Scans Kubernetes nodes
against the CIS
benchmark checks
n github.com/aquasecuri
ty/kube-bench
n Scan images for known
vulnerabilities
n Works within CI tools
n github.com/aquasecuri
ty/trivy
CIS benchmark for K8S
Image vulnerability
scanner K8S penetration-testing
n Tests K8s clusters
against known attack
vectors, both remote
and internal
n github.com/aquasecurit
y/kube-hunter
5
….and more Aqua Open Source Tools….
n CloudSploit is a cloud security auditing and monitoring product that
scans IaaS and SaaS accounts for security risks, including
misconfigurations, malicious API calls and insider threats.
CloudSploit is a CSPM (Cloud Security Posture Management) service.
n github.com/cloudsploit
n Tracee is a lightweight, easy
to use container and system
tracing tool. After launching
the tool, it will start collecting
traces of newly created
containers (container mode)
or processes (system mode).
n github.com/aquasecuri
ty/tracee
System Tracing Tool
Tracee
CloudSploit
Cloud Security Posture Management
CSPM
Kubernetes Configuration Assessment for Security
7
Kubernetes components
■ Kubernetes components
installed on your servers
■ Master & node components
■ Many configuration settings
have a security impact
■ Example: open Kubelet port =
root access
■ Defaults depend on the
installer
Scheduler Controllers Etcd
Kubernetes Master Node
Node
Kubelet
Kube-
proxy
Pod
Node
Kubelet
Kube-
proxy
Pod
Node
Kubelet
Kube-
proxy
Pod
Node
Kubelet
Kube-
proxy
Pod
API Server
CIS Kubernetes benchmark
■ Open source automated tests for CIS Kubernetes Benchmark
■ Tests for Kubernetes Masters and Nodes
■ Available as a container
kube-bench
github.com/aquasecurity/kube-bench
Embacing service-level-objectives of your microservices in your Cl/CD
Kubernetes penetration testing
■ Open source penetration tests for Kubernetes
■ See what an attacker would see
■ github.com/aquasecurity/kube-hunter
■ Online report viewer
■ kube-hunter.aquasec.com
kube-hunter
How do I know the
config is working to
secure my cluster?
kube-hunter.aquasec.com
14
15
Image scanning and CI integration – Trivy
Common Vulnerabilities & Exposures
Known
Vulnerabilities
Unknown
Vulnerabilities
Vulnerabilities
l Static scanning
l Scanner identifying components
with known vulnerabilities
l e.g. Trivy, Clair, Aqua
l Dynamic Threat Analysis
• Identify advanced threats that
try to hide their purpose
• Aqua
Designed by vvstudio / Freepik
19
CentOS OS
Nginx Application
(package)
Binaries
Scanning Container Images
Alpine OS
NodeJS (NPMs)
20
Vulnerability sources
■ Vulnerabilities are
published on different
security advisories
■ NVD – national
vulnerability database
■ Vendors will have
their own advisories
l NVD reports this in Varnish HTTP Cache versions 4.0.0 - 5.2.0
Case study: Debian / CVE-2017-8807
Debian applied
patch to 5.0.0
l System Package
Manager
l apt
l yum
l apk
Detect comprehensive vulnerabilities
● Application Package Manager
● Bundler
● Composer
● Pipenv
● Poetry
● npm
● yarn
● Cargo
Not all scanners are created equal
Information sources / advisories
• NVD
• Distributions
• Vendors
• (Commercial DBs)
Scanning techniques
• Layer-by-layer or image
Detection techniques
• Version comparison
• Hash comparison
Functionality
• Malware
• File scanning
• Windows
Embacing service-level-objectives of your microservices in your Cl/CD
script:
- ./trivy --exit-code 0 --severity HIGH --no-progress --auto-refresh [YOUR_IMAGE]
- ./trivy --exit-code 1 --severity CRITICAL --no-progress --auto-refresh [YOUR_IMAGE]
...
DevSecOps
With Travis CI
With CircleCI
- run:
name: Scan the local image with trivy
command: trivy --exit-code 0 --no-progress --auto-refresh [YOUR_IMAGE]
...
Aqua Enterprise….we call this CSP….Cloud-Native
Security Platform
28
Aqua Cloud Native Security
Cloud IaaS
Orchestration
Workloads
Kubernetes Security
Cloud Security Posture Management
Container &
CaaS
Security
FaaS
Security
VM
Security PAS
SecurityCI/CD,Registries
SIEM,Analytics,Monitoring
LDAP / AD /
SAML
Secrets Vaults Collaboration
Cyber
Intelligence
29
Automatic learning of pod/container behavior and then runtime enforcement
DevSecOps
ContainerContainer
l Immutable containers are easier to
protect
l Any change in runtime is not legit
l If a change is detected, it’s blocked
= No code injection into
containers
Image Container
bin
user
etc
bin
user
etc
?
=
Container Firewall that learns network traffic and then allows granular control of all
inbound and outbound traffic. Policy is enforced regardless where the orchestrator
places the pod/container
Jenkins Aqua Plugin for container images and serverless functions (Lambda)
© 2018 Aqua Security Software Ltd., All Rights Reserved
github.com/aquasecurity/kube-bench
github.com/aquasecurity/kube-hunter
github.com/aquasecurity/trivy
github.com/aquasecurity/tracee
github.com/cloudsploit

More Related Content

PDF
App sec in the time of docker containers
PDF
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
PDF
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
PDF
DevSecOps Basics with Azure Pipelines
PPTX
Dev secops security and compliance at the speed of continuous delivery - owasp
PPTX
DevSecOps OWASP
PPTX
Enable DevSecOps using JIRA Software
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
App sec in the time of docker containers
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
DevSecOps Basics with Azure Pipelines
Dev secops security and compliance at the speed of continuous delivery - owasp
DevSecOps OWASP
Enable DevSecOps using JIRA Software
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...

What's hot (20)

PPTX
DevSecOps reference architectures 2018
PDF
Don’t have a Meltdown! Practical Steps for Defending Your Apps
PDF
Building security into the pipelines
PDF
Hacking into your containers, and how to stop it!
PDF
Policy as code what helm developers need to know about security
PDF
Talk DevSecOps to me
PDF
DevSecOps : The Open Source Way by Yusuf Hadiwinata
PDF
LFX Nov 16, 2021 - Find vulnerabilities before security knocks on your door
PDF
Dev secops. Real experience.
PPTX
Automated Testing in Continuous Change Management
PDF
Rugged DevOps: Bridging Security and DevOps
DOCX
10 things to get right for successful dev secops
PPTX
Infrastructure automation with .NET
PDF
Microsoft DevOps Forum 2021 – DevOps & Security
PDF
use case ibm k8s_service+devops
PDF
DevOps & DevSecOps in Swiss Banking
PDF
Automated Virtualized Testing (AVT) with Docker, Kubernetes, WireMock and Gat...
PDF
Hybrid Cloud Networking
PDF
Cloud Native Engineering with SRE and GitOps
PDF
Workshop Azure DevOps | Docker | Azure Kubernetes Services
DevSecOps reference architectures 2018
Don’t have a Meltdown! Practical Steps for Defending Your Apps
Building security into the pipelines
Hacking into your containers, and how to stop it!
Policy as code what helm developers need to know about security
Talk DevSecOps to me
DevSecOps : The Open Source Way by Yusuf Hadiwinata
LFX Nov 16, 2021 - Find vulnerabilities before security knocks on your door
Dev secops. Real experience.
Automated Testing in Continuous Change Management
Rugged DevOps: Bridging Security and DevOps
10 things to get right for successful dev secops
Infrastructure automation with .NET
Microsoft DevOps Forum 2021 – DevOps & Security
use case ibm k8s_service+devops
DevOps & DevSecOps in Swiss Banking
Automated Virtualized Testing (AVT) with Docker, Kubernetes, WireMock and Gat...
Hybrid Cloud Networking
Cloud Native Engineering with SRE and GitOps
Workshop Azure DevOps | Docker | Azure Kubernetes Services
Ad

Similar to Embacing service-level-objectives of your microservices in your Cl/CD (20)

PPTX
Deploy Secure Cloud-Native Apps Fast
PDF
Cumulonimbus fortification-secure-your-data-in-the-cloud
PDF
Continuous Security: From tins to containers - now what!
PDF
DevSecCon Singapore 2019: Preventative Security for Kubernetes
PDF
Enforcing Immutability and Least Privilege to Secure Containerized Applicatio...
PDF
trivy - Vulnerability Scanning
PDF
Slide DevSecOps Microservices
PDF
Container Security Vulnerability Scanning with Trivy
PDF
Webinar–Vulnerabilities in Containerised Production Environments
PPTX
10.aws system management
PDF
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
PDF
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
PDF
A Developer’s Guide to Kubernetes Security
PDF
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
PDF
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
PDF
Cloud-Native Security
PDF
Cloud Native Security: New Approach for a New Reality
PPTX
Hackproof Your Cloud: Responding to 2016 Threats
PDF
AWS live hack: Docker + Snyk Container on AWS
PDF
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
Deploy Secure Cloud-Native Apps Fast
Cumulonimbus fortification-secure-your-data-in-the-cloud
Continuous Security: From tins to containers - now what!
DevSecCon Singapore 2019: Preventative Security for Kubernetes
Enforcing Immutability and Least Privilege to Secure Containerized Applicatio...
trivy - Vulnerability Scanning
Slide DevSecOps Microservices
Container Security Vulnerability Scanning with Trivy
Webinar–Vulnerabilities in Containerised Production Environments
10.aws system management
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
A Developer’s Guide to Kubernetes Security
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Cloud-Native Security
Cloud Native Security: New Approach for a New Reality
Hackproof Your Cloud: Responding to 2016 Threats
AWS live hack: Docker + Snyk Container on AWS
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
Ad

More from Nebulaworks (19)

PDF
Dynamic Policy Enforcement for Microservice Environments
PDF
Overcoming scalability issues in your prometheus ecosystem
PDF
Why we chose Argo Workflow to scale DevOps at InVision
PDF
Methods to stay focused & productive amidst COVID-19!
PDF
Embracing service-level-objectives of your microservices in your Cl/CD
PDF
Deploying to Day N Operations of Kubernetes and Containerized Apps
PDF
Trunk based development for Beginners
PDF
Distributed tracing with service meshes and tracing spans across polyglot Mic...
PDF
Managing Terraform Module Versioning and Dependencies
PDF
Kubernetes for Beginners
PDF
End to End immutable infrastructure testing
PDF
Building Modern Teams and Software
PDF
Kuberntes Ingress with Kong
PDF
A Hands-on Introduction on Terraform Best Concepts and Best Practices
PDF
The App Developer's Kubernetes Toolbox
PDF
Building a Container Platform with docker swarm
PDF
Effective Micoservice Design & Containers
PDF
Fast Tracking Dev Teams to Container Adoption
PDF
Nebulaworks | Optimize Your DevOps Game
Dynamic Policy Enforcement for Microservice Environments
Overcoming scalability issues in your prometheus ecosystem
Why we chose Argo Workflow to scale DevOps at InVision
Methods to stay focused & productive amidst COVID-19!
Embracing service-level-objectives of your microservices in your Cl/CD
Deploying to Day N Operations of Kubernetes and Containerized Apps
Trunk based development for Beginners
Distributed tracing with service meshes and tracing spans across polyglot Mic...
Managing Terraform Module Versioning and Dependencies
Kubernetes for Beginners
End to End immutable infrastructure testing
Building Modern Teams and Software
Kuberntes Ingress with Kong
A Hands-on Introduction on Terraform Best Concepts and Best Practices
The App Developer's Kubernetes Toolbox
Building a Container Platform with docker swarm
Effective Micoservice Design & Containers
Fast Tracking Dev Teams to Container Adoption
Nebulaworks | Optimize Your DevOps Game

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
Teaching material agriculture food technology
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
A Presentation on Artificial Intelligence
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Building Integrated photovoltaic BIPV_UPV.pdf
Teaching material agriculture food technology
Group 1 Presentation -Planning and Decision Making .pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
1. Introduction to Computer Programming.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation_ Review paper, used for researhc scholars
A comparative study of natural language inference in Swahili using monolingua...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
Unlocking AI with Model Context Protocol (MCP)
SOPHOS-XG Firewall Administrator PPT.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Tartificialntelligence_presentation.pptx
A comparative analysis of optical character recognition models for extracting...
Spectral efficient network and resource selection model in 5G networks
A Presentation on Artificial Intelligence
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...

Embacing service-level-objectives of your microservices in your Cl/CD

  • 1. © 2018 Aqua Security Software Ltd., All Rights Reserved Aqua Security Cloud Native Security
  • 2. 2 The Leading Cloud Native Security Company Aqua helps the world’s leading enterprises to modernize security for their container-based, serverless and cloud native applications, from development to production Open Source Leadership Maintaining the industry-standard tools for container, Kubernetes and cloud security We “wrote the book” on K8s security, and chair the CNCF Technical Oversight Committee Community Leadership CloudSploit
  • 3. Agenda n Aqua’s Open Source Tools n Kubernetes config with Kube-Bench n Kubernetes penetration testing tool with Kube-Hunter n Image scanning and CI integration with Trivvy n Aqua Enterprise called Aqua CSP n Runtime protection n Container firewall
  • 4. 4 Aqua’s Open Source Tools n Scans Kubernetes nodes against the CIS benchmark checks n github.com/aquasecuri ty/kube-bench n Scan images for known vulnerabilities n Works within CI tools n github.com/aquasecuri ty/trivy CIS benchmark for K8S Image vulnerability scanner K8S penetration-testing n Tests K8s clusters against known attack vectors, both remote and internal n github.com/aquasecurit y/kube-hunter
  • 5. 5 ….and more Aqua Open Source Tools…. n CloudSploit is a cloud security auditing and monitoring product that scans IaaS and SaaS accounts for security risks, including misconfigurations, malicious API calls and insider threats. CloudSploit is a CSPM (Cloud Security Posture Management) service. n github.com/cloudsploit n Tracee is a lightweight, easy to use container and system tracing tool. After launching the tool, it will start collecting traces of newly created containers (container mode) or processes (system mode). n github.com/aquasecuri ty/tracee System Tracing Tool Tracee CloudSploit Cloud Security Posture Management CSPM
  • 7. 7 Kubernetes components ■ Kubernetes components installed on your servers ■ Master & node components ■ Many configuration settings have a security impact ■ Example: open Kubelet port = root access ■ Defaults depend on the installer Scheduler Controllers Etcd Kubernetes Master Node Node Kubelet Kube- proxy Pod Node Kubelet Kube- proxy Pod Node Kubelet Kube- proxy Pod Node Kubelet Kube- proxy Pod API Server
  • 9. ■ Open source automated tests for CIS Kubernetes Benchmark ■ Tests for Kubernetes Masters and Nodes ■ Available as a container kube-bench github.com/aquasecurity/kube-bench
  • 12. ■ Open source penetration tests for Kubernetes ■ See what an attacker would see ■ github.com/aquasecurity/kube-hunter ■ Online report viewer ■ kube-hunter.aquasec.com kube-hunter How do I know the config is working to secure my cluster?
  • 14. 14
  • 15. 15
  • 16. Image scanning and CI integration – Trivy
  • 18. Known Vulnerabilities Unknown Vulnerabilities Vulnerabilities l Static scanning l Scanner identifying components with known vulnerabilities l e.g. Trivy, Clair, Aqua l Dynamic Threat Analysis • Identify advanced threats that try to hide their purpose • Aqua Designed by vvstudio / Freepik
  • 19. 19 CentOS OS Nginx Application (package) Binaries Scanning Container Images Alpine OS NodeJS (NPMs)
  • 20. 20 Vulnerability sources ■ Vulnerabilities are published on different security advisories ■ NVD – national vulnerability database ■ Vendors will have their own advisories
  • 21. l NVD reports this in Varnish HTTP Cache versions 4.0.0 - 5.2.0 Case study: Debian / CVE-2017-8807
  • 23. l System Package Manager l apt l yum l apk Detect comprehensive vulnerabilities ● Application Package Manager ● Bundler ● Composer ● Pipenv ● Poetry ● npm ● yarn ● Cargo
  • 24. Not all scanners are created equal Information sources / advisories • NVD • Distributions • Vendors • (Commercial DBs) Scanning techniques • Layer-by-layer or image Detection techniques • Version comparison • Hash comparison Functionality • Malware • File scanning • Windows
  • 26. script: - ./trivy --exit-code 0 --severity HIGH --no-progress --auto-refresh [YOUR_IMAGE] - ./trivy --exit-code 1 --severity CRITICAL --no-progress --auto-refresh [YOUR_IMAGE] ... DevSecOps With Travis CI With CircleCI - run: name: Scan the local image with trivy command: trivy --exit-code 0 --no-progress --auto-refresh [YOUR_IMAGE] ...
  • 27. Aqua Enterprise….we call this CSP….Cloud-Native Security Platform
  • 28. 28 Aqua Cloud Native Security Cloud IaaS Orchestration Workloads Kubernetes Security Cloud Security Posture Management Container & CaaS Security FaaS Security VM Security PAS SecurityCI/CD,Registries SIEM,Analytics,Monitoring LDAP / AD / SAML Secrets Vaults Collaboration Cyber Intelligence
  • 29. 29 Automatic learning of pod/container behavior and then runtime enforcement
  • 30. DevSecOps ContainerContainer l Immutable containers are easier to protect l Any change in runtime is not legit l If a change is detected, it’s blocked = No code injection into containers Image Container bin user etc bin user etc ? =
  • 31. Container Firewall that learns network traffic and then allows granular control of all inbound and outbound traffic. Policy is enforced regardless where the orchestrator places the pod/container
  • 32. Jenkins Aqua Plugin for container images and serverless functions (Lambda)
  • 33. © 2018 Aqua Security Software Ltd., All Rights Reserved github.com/aquasecurity/kube-bench github.com/aquasecurity/kube-hunter github.com/aquasecurity/trivy github.com/aquasecurity/tracee github.com/cloudsploit