+ All Categories
Home > Technology > A (fun!) Comparison of Docker Vulnerability Scanners

A (fun!) Comparison of Docker Vulnerability Scanners

Date post: 06-Apr-2017
Category:
Upload: john-kinsella
View: 163 times
Download: 0 times
Share this document with a friend
29
A (FUN!) COMPARISON OF DOCKER VULNERABILITY SCANNERS
Transcript
Page 1: A (fun!) Comparison of Docker Vulnerability Scanners

A (FUN!) COMPARISON OF DOCKER VULNERABILITY SCANNERS

Page 2: A (fun!) Comparison of Docker Vulnerability Scanners

FIRST, A NOTE FROM OUR LAWYERS…

We understand that different people have different understandings for the meaning of the word “fun.” We believe that Mr. Kinsella has prepared this talk with true intention to provide a entertaining look into what many (including us) would consider an impossibly dry subject. Information security is bad enough – have you ever looked at Seccomp? He’s giving a talk on that on Wednesday, we guess they had extra rooms at the conference? We thought some of our contracts were bad! Anyways, point is – by reading this text and continuing to remain in the conference hall, you hereby understand that this guy (can be) funny and he’s going to try and make this a fun talk, but you waive your right for recourse in the event you do not emit nary a giggle.

Page 3: A (fun!) Comparison of Docker Vulnerability Scanners

•20 years in security industry•Previously wrote a vulnerability scanner for Linux, Solaris, Windows•Long open source history•Active in Cloud Security Alliance•Founder and CTO of Layered Insight

Page 4: A (fun!) Comparison of Docker Vulnerability Scanners

OVERVIEW• Fun!• Scanning Overview• Discuss a few tools• How to minimize vulnerabilities in your images• Vulnerability triage

Page 5: A (fun!) Comparison of Docker Vulnerability Scanners

TRIGGER WARNING: SECURITY VENDORS

Page 6: A (fun!) Comparison of Docker Vulnerability Scanners

VULNERABILITY SCANNERS

Page 7: A (fun!) Comparison of Docker Vulnerability Scanners

ANOTHER NOTE FROM OUR LAWYERS The previous slide depicted a sample of logos

representing products and vendors in the information security space who claim to provide software or services capable of determining the presence of vulnerable software in a given computer system. As this is a sample set, some vendors or products may not have been listed. Logos which are displayed may differ in size; This is due to laziness on the part of Mr. Kinsella, and is not to be interpreted as a comment on the market share, company size, or effectiveness of any particular logo or representative product. This goes for the next slide, as well.

He’s an engineer. They’re lazy. He’ll probably file a pull request on this slide deck next week for a basic typo. Don’t look at me like that. How am I supposed to know how to merge a patch on a PowerPoint file?

Page 8: A (fun!) Comparison of Docker Vulnerability Scanners

CONTAINER SCANNERS

http://thenewstack.io/draft-vulnerability-scanners/

Page 9: A (fun!) Comparison of Docker Vulnerability Scanners

HOST VS NETWORK SCANNING Network based shows vulnerabilities exposed to the network (running

services not protected by firewalls) Host based shows vulnerabilities in installed sw – doesn’t have to be

running

Host Network

Page 10: A (fun!) Comparison of Docker Vulnerability Scanners

WHY IS CONTAINER SCANNING DIFFERENT?

A container image is made up of layers – to get a real understanding of the vulnerability stance of an image, need to assess each layer

Image: Docker

Page 11: A (fun!) Comparison of Docker Vulnerability Scanners

GATHER INVENTORY…

Page 12: A (fun!) Comparison of Docker Vulnerability Scanners

COMPARE TO CVE/NVD

Page 13: A (fun!) Comparison of Docker Vulnerability Scanners

WHEN VERSION MATCHES CVE…

Page 14: A (fun!) Comparison of Docker Vulnerability Scanners

BUT THE BOX IS PATCHED?

Page 15: A (fun!) Comparison of Docker Vulnerability Scanners

COMPARE TO OVAL Vulnerability databases are specific to OS distributions, understands

versions much better

Page 16: A (fun!) Comparison of Docker Vulnerability Scanners

OVAL IS DISTRO-AWARE

(from https://github.com/coreos/clair/ )

Page 17: A (fun!) Comparison of Docker Vulnerability Scanners
Page 18: A (fun!) Comparison of Docker Vulnerability Scanners
Page 19: A (fun!) Comparison of Docker Vulnerability Scanners

UBUNTU SHOWS ISSUES…

(from https://people.canonical.com/~ubuntu-security/cve/pkg/glibc.html )

Page 20: A (fun!) Comparison of Docker Vulnerability Scanners

SMALLER IMAGE, LESS VULNERABILITIES

Don’t use from:debian, unless really needed

Page 21: A (fun!) Comparison of Docker Vulnerability Scanners

WHY? LEAST PRIVILEGE We want the smallest image possible, when we load it across 100 hosts

The smaller the image, the less exposure for potential vulnerabilities

Page 22: A (fun!) Comparison of Docker Vulnerability Scanners

TRIAGE

Page 23: A (fun!) Comparison of Docker Vulnerability Scanners

TRIAGE As we move to devops, developers are being exposed to the secops work

of vuln/patch management

Page 24: A (fun!) Comparison of Docker Vulnerability Scanners

HOW TO HANDLE THIS??

Page 25: A (fun!) Comparison of Docker Vulnerability Scanners

Understand CVSS v2

Page 26: A (fun!) Comparison of Docker Vulnerability Scanners

CVSS CALCULATOR

Page 27: A (fun!) Comparison of Docker Vulnerability Scanners

ENVIRONMENTAL SCORE!

Page 28: A (fun!) Comparison of Docker Vulnerability Scanners

THANKS!

@johnlkinsella

http://layeredinsight.com

Page 29: A (fun!) Comparison of Docker Vulnerability Scanners

CREDITS Dogs from Last Week Tonights Real Animals, Fake Paws Cats from:

http://i.telegraph.co.uk/multimedia/archive/02830/cat_2830677b.jpg http://imgur.com/gallery/KWvtdg0 http://imgur.com/gallery/2u6BW


Recommended