SlideShare a Scribd company logo
Why should developers care
about container security?
Eric Smalling | Sr. Developer Advocate @ Snyk
@ericsmalling
Stranger Danger!
Container Edition
Eric Smalling | Sr. Developer Advocate @ Snyk
@ericsmalling
DevOps Container
Security Challenges
Eric Smalling | Sr. Developer Advocate @ Snyk
@ericsmalling
Eric Smalling
● Senior Developer Advocate @ Snyk
● Based in Dallas/Fort Worth, Texas
● 20+ years enterprise software development
● 10+ years build/test/deploy automation (CI/CD)
● Docker user since 2013 (v0.6)
● 2018 Jenkins Ambassador
● Docker Captain
● CKA, CKAD & CKS Certified
@ericsmalling
Agenda
Devops vs Security
Container Challenges
Demo
01
02
03
04 Conclusions
DevOps
Coding
Test & Fix
Branch Repo
Test, Fix
Monitor
CI/CD
Test & Fix
Production
Test, Fix
Monitor
Test
Registry
Build Deploy
Get artifacts
Ge public & private artifacts
SDLC Pipeline
DevSecOps
Container Challenges
Historically, developers have owned
the security posture of their own
code and the libraries used.
Containers add security concerns
at the operating-system level such
as base-image selection, package
installation, user and file
permissions, and more.
Increased Scope of
Responsibility
These additional technologies used
to be owned by other teams such
as system engineers or middleware
teams. Many developers have
never had to deal with securing
these layers of the stack.
Lack of Expertise
While shifting security left adds
responsibilities to developer teams,
the business owners have
expectations that pipeline velocity
will not be negatively impacted.
Maintaining Velocity
Ownership of
developers
What does my service contain?
● Source code of my app
● 3rd party dependencies
● Dockerfile
● IaC files (eg. Terraform)
● K8s files
The financial giant said the
intruder exploited a
configuration vulnerability
“
“
-- https://www.theregister.com/2019/07/30/capital_one_hacked/
Configuration is a security risk
Enough Slides.
Demo Time!
Coding
Test & Fix
Branch Repo
Test, Fix
Monitor
CI/CD
Test & Fix
Production
Test, Fix
Monitor
Test
Registry
Build Deploy
Get artifacts
Ge public & private artifacts
SDLC Pipeline
DevOps Feedback Loop
Empowering developers to build applications
securely within the entire development process
Defence
in Depth
Further practices
and tech to
consider.
Images
Runtime
Kubernetes
Defence
in Depth
Further practices
and tech to
consider.
Images
Runtime
Kubernetes
Minimize Footprint
Don’t give hackers more tools to expand their exploits
Layer Housekeeping
Understand how layers work at build and run-time
Build strategies
Multi-Stage, repeatable builds, standardized labeling,
alternative tools
Secure Supply Chain
Know where images come from.
Only CI should push to registries.
Defence
in Depth
Further practices
and tech to
consider.
Images
Runtime
Kubernetes
Don’t run as root
You probably don’t need it.
Privileged Containers
You almost definitely don’t need it.
Drop capabilities
Most apps don’t need even Linux capabilities;
dropping all and allow only what’s needed.
Read Only Root Filesystem
Immutability makes exploiting your container harder.
Deploy from known sources
Pull from known registries only.
Defence
in Depth
Further practices
and tech to
consider.
Images
Runtime
Kubernetes
Secrets
Use them but make sure they’re encrypted and have
RBAC applied
RBAC
Hopefully everybody is using this.
SecurityContext
Much of the Runtime practices mentioned can be
enforced via SC
Network Policy
Start with zero-trust and add allow rules only as
necessary.
Enforcement
Use OPA (Gatekeeper), Kyverno, etc
Key Takeaways
Just like unit tests, fast, actionable
security feedback is critical.
Working security into a developer’s
workflow without slowing them
down drives adoption.
Feedback Loop
Giving developers tools that
provide actionable information can
allow them to deal with security
issues as they are introduced.
Empower developers
to be proactive
Implementing known secure
practices for building and running
your container images and IaC
configurations can mitigate
vulnerabilities that slip into
deployments as well as zero-day
vulnerabilities that may exist.
Defence in depth
References:
● Kubernetes SecurityContext Cheatsheet: https://snyk.co/udW5K
● Dockerfile Best Practices: https://docs.docker.com/develop/develop-images/dockerfile_best-practices
● Using multi-stage builds: https://docs.docker.com/develop/develop-images/multistage-build
● OPA Gatekeeper: https://open-policy-agent.github.io/gatekeeper/website/docs
● Kyverno: https://kyverno.io
● PodSecurityPolicy Deprecation: Past, Present, and Future: https://kubernetes.io/blog/2021/04/06/podsecuritypolicy-deprecation-past-present-and-future
● CNCF Certification Curriculum: https://github.com/cncf/curriculum
● Snyk Kubernetes “Quick hit” videos: https://youtube.com/playlist?list=PLQ6IC7glz4-UA4uKQOhmAxh6Mhvr3m4g-
Thank you!
@ericsmalling

More Related Content

PDF
DevSecOps | DevOps Sec
PDF
AWS live hack: Docker + Snyk Container on AWS
PPTX
Integrate Security into DevOps - SecDevOps
PDF
Devops security-An Insight into Secure-SDLC
PPT
Code Quality - Security
PPTX
DevSecOps : an Introduction
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PPTX
AllDayDevOps 2019 AppSensor
DevSecOps | DevOps Sec
AWS live hack: Docker + Snyk Container on AWS
Integrate Security into DevOps - SecDevOps
Devops security-An Insight into Secure-SDLC
Code Quality - Security
DevSecOps : an Introduction
Bringing Security Testing to Development: How to Enable Developers to Act as ...
AllDayDevOps 2019 AppSensor

What's hot (20)

PPTX
Integrating security into Continuous Delivery
PPTX
You Build It, You Secure It: Introduction to DevSecOps
PDF
Dev seccon london 2016 intelliment security
PPTX
ABN AMRO DevSecOps Journey
PDF
DevSecOps: essential tooling to enable continuous security 2019-09-16
PPTX
Implementing an Application Security Pipeline in Jenkins
PPTX
How to Get Started with DevSecOps
PPTX
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
PPTX
A journey from dev ops to devsecops
PDF
Dos and Don'ts of DevSecOps
PDF
Talk DevSecOps to me
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
PDF
Introduction to DevSecOps
PDF
DevSecOps: What Why and How : Blackhat 2019
PDF
Secure Your Code Implement DevSecOps in Azure
PDF
SecDevOps
PPTX
Application security meetup - cloud security best practices 24062021
PDF
8 Tips for Deploying DevSecOps
Integrating security into Continuous Delivery
You Build It, You Secure It: Introduction to DevSecOps
Dev seccon london 2016 intelliment security
ABN AMRO DevSecOps Journey
DevSecOps: essential tooling to enable continuous security 2019-09-16
Implementing an Application Security Pipeline in Jenkins
How to Get Started with DevSecOps
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Training Bootcamp - A Practical DevSecOps Course
A journey from dev ops to devsecops
Dos and Don'ts of DevSecOps
Talk DevSecOps to me
AWS live hack: Atlassian + Snyk OSS on AWS
Introduction to DevSecOps
DevSecOps: What Why and How : Blackhat 2019
Secure Your Code Implement DevSecOps in Azure
SecDevOps
Application security meetup - cloud security best practices 24062021
8 Tips for Deploying DevSecOps
Ad

Similar to Why should developers care about container security? (20)

PDF
Python Web Conference 2022 - Why should devs care about container security.pdf
PDF
Why Should Developers Care About Container Security?
PDF
ATO 2022 - Why should devs care about container security.pdf
PDF
Container Stranger Danger - Why should devs care about container security
PDF
GDG SLK - Why should devs care about container security.pdf
PDF
KubeHuddle NA 2023 - Why should devs care about container security - Eric Sma...
PDF
Hacking into your containers, and how to stop it!
PDF
DevSecCon Lightning 2021- Container defaults are a hackers best friend
PDF
LFX Nov 16, 2021 - Find vulnerabilities before security knocks on your door
PPTX
Container security Familiar problems in new technology
PDF
Justin Cormack - The 10 Container Security Tricks That Will Help You Sleep At...
PPTX
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
PPTX
10 tips for Cloud Native Security
PDF
Webinar–Vulnerabilities in Containerised Production Environments
PDF
Santander DevopsandCloudDays 2021 - Hardening containers.pdf
PDF
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
PPTX
Workshop: Hands-On Container Image Security Mastering Sigstore for Unbreachab...
PDF
Strategy, planning and governance for enterprise deployments of containers - ...
PDF
Docker Enterprise Deployment Planning
PDF
Security Patterns for Microservice Architectures - SpringOne 2020
Python Web Conference 2022 - Why should devs care about container security.pdf
Why Should Developers Care About Container Security?
ATO 2022 - Why should devs care about container security.pdf
Container Stranger Danger - Why should devs care about container security
GDG SLK - Why should devs care about container security.pdf
KubeHuddle NA 2023 - Why should devs care about container security - Eric Sma...
Hacking into your containers, and how to stop it!
DevSecCon Lightning 2021- Container defaults are a hackers best friend
LFX Nov 16, 2021 - Find vulnerabilities before security knocks on your door
Container security Familiar problems in new technology
Justin Cormack - The 10 Container Security Tricks That Will Help You Sleep At...
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
10 tips for Cloud Native Security
Webinar–Vulnerabilities in Containerised Production Environments
Santander DevopsandCloudDays 2021 - Hardening containers.pdf
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
Workshop: Hands-On Container Image Security Mastering Sigstore for Unbreachab...
Strategy, planning and governance for enterprise deployments of containers - ...
Docker Enterprise Deployment Planning
Security Patterns for Microservice Architectures - SpringOne 2020
Ad

More from Eric Smalling (11)

PDF
DockerCon 2023 - Live Demo_Hardening Against Kubernetes Hacks.pdf
PDF
KubeCon NA 2022 - Hardening against Kubernetes Hacks.pdf
PDF
DevOpsDays Chicago 2022 - Hands-on hacking containers and ways to prevent it
PDF
Look Ma' - Building Java and Go based container images without Dockerfiles
PDF
SCaLE 19x - Eric Smalling - Hardening against Kubernetes Hacks
PDF
DockerCon 2022 - From legacy to Kubernetes, securely & quickly
PDF
So. many. vulnerabilities. Why are containers such a mess and what to do abou...
PDF
IBM Index 2018 Conference Workshop: Modernizing Traditional Java App's with D...
PDF
Best Practices for Developing & Deploying Java Applications with Docker
PDF
Docker 101 Workshop slides (JavaOne 2017)
PPTX
Simply your Jenkins Projects with Docker Multi-Stage Builds
DockerCon 2023 - Live Demo_Hardening Against Kubernetes Hacks.pdf
KubeCon NA 2022 - Hardening against Kubernetes Hacks.pdf
DevOpsDays Chicago 2022 - Hands-on hacking containers and ways to prevent it
Look Ma' - Building Java and Go based container images without Dockerfiles
SCaLE 19x - Eric Smalling - Hardening against Kubernetes Hacks
DockerCon 2022 - From legacy to Kubernetes, securely & quickly
So. many. vulnerabilities. Why are containers such a mess and what to do abou...
IBM Index 2018 Conference Workshop: Modernizing Traditional Java App's with D...
Best Practices for Developing & Deploying Java Applications with Docker
Docker 101 Workshop slides (JavaOne 2017)
Simply your Jenkins Projects with Docker Multi-Stage Builds

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PDF
cuic standard and advanced reporting.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Cloud computing and distributed systems.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
Teaching material agriculture food technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
NewMind AI Monthly Chronicles - July 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
Cloud computing and distributed systems.
Understanding_Digital_Forensics_Presentation.pptx
Big Data Technologies - Introduction.pptx
Unlocking AI with Model Context Protocol (MCP)
Teaching material agriculture food technology
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Why should developers care about container security?

  • 1. Why should developers care about container security? Eric Smalling | Sr. Developer Advocate @ Snyk @ericsmalling
  • 2. Stranger Danger! Container Edition Eric Smalling | Sr. Developer Advocate @ Snyk @ericsmalling
  • 3. DevOps Container Security Challenges Eric Smalling | Sr. Developer Advocate @ Snyk @ericsmalling
  • 4. Eric Smalling ● Senior Developer Advocate @ Snyk ● Based in Dallas/Fort Worth, Texas ● 20+ years enterprise software development ● 10+ years build/test/deploy automation (CI/CD) ● Docker user since 2013 (v0.6) ● 2018 Jenkins Ambassador ● Docker Captain ● CKA, CKAD & CKS Certified @ericsmalling
  • 5. Agenda Devops vs Security Container Challenges Demo 01 02 03 04 Conclusions
  • 7. Coding Test & Fix Branch Repo Test, Fix Monitor CI/CD Test & Fix Production Test, Fix Monitor Test Registry Build Deploy Get artifacts Ge public & private artifacts SDLC Pipeline
  • 9. Container Challenges Historically, developers have owned the security posture of their own code and the libraries used. Containers add security concerns at the operating-system level such as base-image selection, package installation, user and file permissions, and more. Increased Scope of Responsibility These additional technologies used to be owned by other teams such as system engineers or middleware teams. Many developers have never had to deal with securing these layers of the stack. Lack of Expertise While shifting security left adds responsibilities to developer teams, the business owners have expectations that pipeline velocity will not be negatively impacted. Maintaining Velocity
  • 10. Ownership of developers What does my service contain? ● Source code of my app ● 3rd party dependencies ● Dockerfile ● IaC files (eg. Terraform) ● K8s files
  • 11. The financial giant said the intruder exploited a configuration vulnerability “ “ -- https://www.theregister.com/2019/07/30/capital_one_hacked/ Configuration is a security risk
  • 13. Coding Test & Fix Branch Repo Test, Fix Monitor CI/CD Test & Fix Production Test, Fix Monitor Test Registry Build Deploy Get artifacts Ge public & private artifacts SDLC Pipeline
  • 14. DevOps Feedback Loop Empowering developers to build applications securely within the entire development process
  • 15. Defence in Depth Further practices and tech to consider. Images Runtime Kubernetes
  • 16. Defence in Depth Further practices and tech to consider. Images Runtime Kubernetes Minimize Footprint Don’t give hackers more tools to expand their exploits Layer Housekeeping Understand how layers work at build and run-time Build strategies Multi-Stage, repeatable builds, standardized labeling, alternative tools Secure Supply Chain Know where images come from. Only CI should push to registries.
  • 17. Defence in Depth Further practices and tech to consider. Images Runtime Kubernetes Don’t run as root You probably don’t need it. Privileged Containers You almost definitely don’t need it. Drop capabilities Most apps don’t need even Linux capabilities; dropping all and allow only what’s needed. Read Only Root Filesystem Immutability makes exploiting your container harder. Deploy from known sources Pull from known registries only.
  • 18. Defence in Depth Further practices and tech to consider. Images Runtime Kubernetes Secrets Use them but make sure they’re encrypted and have RBAC applied RBAC Hopefully everybody is using this. SecurityContext Much of the Runtime practices mentioned can be enforced via SC Network Policy Start with zero-trust and add allow rules only as necessary. Enforcement Use OPA (Gatekeeper), Kyverno, etc
  • 19. Key Takeaways Just like unit tests, fast, actionable security feedback is critical. Working security into a developer’s workflow without slowing them down drives adoption. Feedback Loop Giving developers tools that provide actionable information can allow them to deal with security issues as they are introduced. Empower developers to be proactive Implementing known secure practices for building and running your container images and IaC configurations can mitigate vulnerabilities that slip into deployments as well as zero-day vulnerabilities that may exist. Defence in depth
  • 20. References: ● Kubernetes SecurityContext Cheatsheet: https://snyk.co/udW5K ● Dockerfile Best Practices: https://docs.docker.com/develop/develop-images/dockerfile_best-practices ● Using multi-stage builds: https://docs.docker.com/develop/develop-images/multistage-build ● OPA Gatekeeper: https://open-policy-agent.github.io/gatekeeper/website/docs ● Kyverno: https://kyverno.io ● PodSecurityPolicy Deprecation: Past, Present, and Future: https://kubernetes.io/blog/2021/04/06/podsecuritypolicy-deprecation-past-present-and-future ● CNCF Certification Curriculum: https://github.com/cncf/curriculum ● Snyk Kubernetes “Quick hit” videos: https://youtube.com/playlist?list=PLQ6IC7glz4-UA4uKQOhmAxh6Mhvr3m4g- Thank you! @ericsmalling