Demystifying a Docker Image

in Cybersecurity6 years ago

image.png

Six months ago ForAllSecure started analyzing Docker images. What does this mean? Imagine we have a user who wants us to fuzz their application. How do they give it to us? Do they tar it up? Do they give us access to an environment where it’s running? Do we integrate into their build pipeline? Applications are an entire ecosystem — they require specific library versions, environment variables, users, etc. While it may seem like a small limitation conceptually, this added barrier can contribute to the friction between development and security teams, especially as organizations look to incorporate security as a part of their build cycles.

Protect Your Digital Assets - Consumer Guide To Digital Security

[Our thoughts]: using containers can be helpful due to convenience and reduce costs. But they require more intense analysis because hackers can use shard attacks on containers which are harder to catch. Consider how a container is used compared to a full machine - this is why attackers don't need to concern themselves with some attacks against containers.

Read rest of the article.

Sort:  

Congratulations @sqlinsix! You have completed the following achievement on the Hive blockchain and have been rewarded with new badge(s) :

You are a buzzy bee and published a post every day of the week

You can view your badges on your board and compare to others on the Ranking
If you no longer want to receive notifications, reply to this comment with the word STOP

Do not miss the last post from @hivebuzz:

Hive Revolution - Mission 1 - Communication
Hive Revolution - Call for missions
Vote for us as a witness to get one more badge and upvotes from us with more power!