Please Don't Kill Your Containers

Please Don't Kill Your Containers

Finally, the ability to view very granular components of an application and understand their behavior makes automated response a gentler and less risky proposition.

The New Security Imperative

With new container-based architectures, we cannot continue to apply security in the same way. Most existing security solutions are completely helpless in the face of new container-based stacks, with new accelerated processes, and with new architectures - but it’s wrong to think of it as purely a technological incompatibility. The shift is fundamental. It’s organizational as well as technological, and it’s a shift from focusing on infrastructure to focusing on the application.

This is also really good news, because containers and the entire cloud-native stack are a huge opportunity to make security a lot better:

  • The processes that govern container development and delivery break down the barrier between developers and operations. There’s a lot of power placed in the hands of the developer, who can now ship code into production in a more seamless way. This is an opportunity to “shift left” security and make sure that this code is more secure from the start. Security as an embedded step, not as an afterthought.
  • The simplicity of containers makes it easier to understand their intended purpose, as well as their actual function. Unlike monolithic applications, containers perform simple, single-purpose functions. If you can understand those functions (which we do), you can define and whitelist normal behavior.
  • The immutable nature of containers makes it easy to detect any attempt to interfere with them in runtime environments. Any change that did not come from the original pipeline is not legitimate, so it’s easy to enforce this immutability.
  • Container networking is also fundamentally different, and can occur between containers on the same host or bare-metal stack (rather than across traditional IP network nodes). But all this communication between components of the application used to be invisible in monolithic applications, and now with the right tooling it is both visible and controllable.
  • Finally, the ability to view very granular components of an applications and understand their behavior makes automated response a gentler and less risky proposition. There’s no need to take an entire application down. There’s no need to even kill a container. With very fine precision that was never available before, you can block specific activities or network connections, so the potential impact on application uptime is minimal. We have the opportunity to stop attacks as they happen, not after the fact, and do so with less downtime than ever before.

To sum up: Our vision is to provide the next generation of application security for the cloud-native era, with less friction, more granularity and more automation.

Want to learn more? Drop me a note.

eric at aquasec.com

Aqua Security


要查看或添加评论,请登录

Eric Gold的更多文章

  • Orca SideScanning Quick Intro

    Orca SideScanning Quick Intro

    Cloud workloads are vastly different than the ‘90s-style physical servers running on bare metal. Unfortunately, many…

    4 条评论
  • Cloud Security Deserves Better

    Cloud Security Deserves Better

    How is it possible for a startup like Orca Security to wipe the floor with prominent cloud security vendors like Palo…

    5 条评论
  • Virtualizationism: Winning the Cloud Security Game

    Virtualizationism: Winning the Cloud Security Game

    Overview To win at cloud security, tools must provide visibility based on the singularity of virtualization. The cloud…

    1 条评论
  • Agentless & Wide "Deep Cloud Inspection"

    Agentless & Wide "Deep Cloud Inspection"

    (If at any time during your reading of this article you decide you want to learn much more about Orca, then just visit…

  • Of Tricorders & Cloud Asset Visibility

    Of Tricorders & Cloud Asset Visibility

    Synopsys: Last year, eight Check Point architects and a CTO left to found Orca Security. They invented "Side Scanning"…

    6 条评论
  • Cybersecurity Assessments in Mergers and Acquisitions

    Cybersecurity Assessments in Mergers and Acquisitions

    (ISC)2 – the world’s largest nonprofit association of certified cybersecurity professionals – this week released the…

  • Why I joined Orca Security

    Why I joined Orca Security

    I coined a new phrase when I was prepping for my new job at Orca Security: "deep cloud inspection". Read the whole post…

    1 条评论
  • Securing Cloud-Native Workloads on AWS

    Securing Cloud-Native Workloads on AWS

    Learn more here: Aqua and AWS As an Advanced APN member and Container Competency technology partner, Aqua provides…

    1 条评论
  • Securing K8s Apps on Google Cloud Platform

    Securing K8s Apps on Google Cloud Platform

    The Aqua Container Security Platform (CSP) works seamlessly on Google Cloud Platform, integrating with its container…

  • Please Don't Kill Your Containers

    Please Don't Kill Your Containers

    Finally, the ability to view very granular components of an application and understand their behavior makes automated…

社区洞察

其他会员也浏览了