+ All Categories
Home > Technology > Docker Online Meetup #39: Docker Security with Nathan McCauley

Docker Online Meetup #39: Docker Security with Nathan McCauley

Date post: 17-Feb-2017
Category:
Upload: docker-inc
View: 2,542 times
Download: 1 times
Share this document with a friend
17
Securing the Software Supply Chain with Docker Nathan McCauley, Director Security
Transcript
Page 1: Docker Online Meetup #39: Docker Security with Nathan McCauley

Securing the Software Supply Chain with DockerNathan McCauley, Director Security

Page 2: Docker Online Meetup #39: Docker Security with Nathan McCauley

Announcement Overview: Security Scanning

2

General availability of Docker Security Scanning (formerly Project Nautilus) enabling detailed image security profiles, continuous vulnerability monitoring, and notifications for integrated content security in the software supply chain.● Limited time free trial for Docker Cloud private repo customers● Coming soon as an integrated feature in Docker Datacenter● Expanding soon to all Docker Cloud repo users● Have secured over 400M pulls of Official Repos in last 6 months

Updated Docker Bench for checking host and daemon configs● Implement recommendations from latest CIS Docker 1.11.0 Benchmark

Page 3: Docker Online Meetup #39: Docker Security with Nathan McCauley

Docker secures your software supply chain

+ +Secure

PlatformSecure Content

Secure Access

Strong isolation and secure by default

Authentication, authorization and

access control

Content integrity and trust

• Does not hinder speed or creativity • Accelerate secure development

For Developers For IT ops

• Flexible and granular controls• Proactive risk management

Page 4: Docker Online Meetup #39: Docker Security with Nathan McCauley

Containers as a Service for the modern software supply chain

Developers

BUILDDevelopment Environments

SHIPSecure Content & Collaboration

RUNDeploy, Manage, Scale

IT Operations

Page 5: Docker Online Meetup #39: Docker Security with Nathan McCauley

pid namespace

mnt namespace

net namespace

uts namespace

user namespace

pivot_root

uid/gid drop

cap drop

all cgroups

selinux

apparmor

seccomp

All Linux isolation

capabilities Secure by

default

1. Out of the box default settings

and profiles

2. Granular controls to

customize settings

Page 6: Docker Online Meetup #39: Docker Security with Nathan McCauley

Best Practices: Docker Bench update

Ensure secure host configurations• Aligned to recommendations in Center for

Internet Security’s Benchmark for Docker Engine 1.11

• Automates checking your host configs against the benchmark recommendations

Easy to use• Available to run as a container or using a

Compose file

www.dockerbench.com

Page 7: Docker Online Meetup #39: Docker Security with Nathan McCauley

What’s NewSecure Content: Image scanning and vulnerability detection

Deep visibility with binary level scanning

• Detailed BOM of included components and vulnerability profile

• Checks packages against CVE database AND the code inside to protect against tampering

• Covers wide range of languages, binaries, OS

Proactive risk management • Continuous monitoring of CVE/NVD

databases with notifications pointing to repos and tags that contain new vulnerabilities

Secure the software supply chain• Integrated workflow with Docker Content Trust• Available for Official Repos since Nov 2015

7

Sample Bill of Materials (BOM)

Page 8: Docker Online Meetup #39: Docker Security with Nathan McCauley

Secure Content: Image scanning and vulnerability detection

API

ScannerCVE

Scanningvalidation

service

Docker Security Scanning

Scan Trigger(APIs)

Plugin Fram

ework CVE/NVD

DatabaseBOM Database BOM

Notifications

Push image

Docker Cloud

Page 9: Docker Online Meetup #39: Docker Security with Nathan McCauley

Common questions on content security

●What is inside my container?

●How do I know where this code came from?

●How do I keep our team safe from bad components?

●How do I stay on top of patches for compliance and governance?

●How do I NOT make this a giant pain for everyone? (including myself)

9

Page 10: Docker Online Meetup #39: Docker Security with Nathan McCauley

Securing the software supply chain with Docker

Before Docker After Docker

• Faster, more successful software updates

• Simplify software compliance process

• Trusted delivery with self contained, secure and signed containers

• Unified workflow enabling both dev and ops

• Cumbersome tools with high failure rates of patches

• Reactive and slow process

• Software and dependency matrix with patches create more dependencies and clashes

• Security is a silo from dev and app ops

Page 11: Docker Online Meetup #39: Docker Security with Nathan McCauley

1. Start with a secure base

SHIPSecure Content & Collaboration

11

Set up a central repository • IT creates and scans base images. • Images are digitally signed• Images are pushed to central registry

IT

BOM

Root Key

Scanning

Registry

Page 12: Docker Online Meetup #39: Docker Security with Nathan McCauley

2. Build secure appsDevelopers

BUILDDevelopment Environments

SHIPSecure Content & Collaboration

12

Enable developer workflows• Pull from library of secure images• Local Docker host establishes trust with repo and registry• Build apps, add image layers and CI test• Scan updated image and generate new BOM• Remediate issues or deploy

BOM

Scanning

View history of BOMs for all scanned tags per repo

Page 13: Docker Online Meetup #39: Docker Security with Nathan McCauley

3. Deploy appsDevelopers

BUILDDevelopment Environments

SHIPSecure Content & Collaboration

13

Deploy your apps• Deploy apps to next environment• Secure host configurations with Docker Bench• Hosts establish trust with repo

RUNDeploy, Manage, Scale

IT Operations

Docker hosts

Page 14: Docker Online Meetup #39: Docker Security with Nathan McCauley

4. Proactively manage vulnerabilities and updatesDevelopers

BUILDDevelopment Environments

SHIPSecure Content & Collaboration

14

Proactively manage new vulnerabilities • New VULN added to database

regarding a package• Docker checks all BOMs that have

this package• Notification is sent re: affected

repos and tags

IT Operations

BOM

RUNDeploy, Manage, Scale

Docker hosts

CVE Database

New VULN added

Email Notification

Page 15: Docker Online Meetup #39: Docker Security with Nathan McCauley

4. Proactively manage vulnerabilities and updatesDevelopers

BUILDDevelopment Environments

SHIPSecure Content & Collaboration

15

Manage software compliance and governance• Update image, re-scan for new BOM, re-sign, re-push to registry• Remove compromised containers• Deploy new containers • Image freshness guarantee ensures the only the latest runs

IT Operations

RUNDeploy, Manage, Scale

Docker hosts New BOM

Scanning

Page 16: Docker Online Meetup #39: Docker Security with Nathan McCauley

Docker secures your software supply chain

16

+ +Secure

PlatformSecure Content

Secure Access

Role based access control (RBAC)

AD/LDAP integration

Auth plugins

Docker Content Trust

Security Scanning

All available isolation and containment

Default security settings and profiles

Docker Bench

Page 17: Docker Online Meetup #39: Docker Security with Nathan McCauley

THANK YOU


Recommended