Wednesday, June 29, 2022
  • Analytic Co-Pilot Security Use Cases
  • Discovering and Protecting APIs Anywhere
  • USENIX Enigma 2022 – Reza Shokri’s ‘Auditing Data Privacy For Machine Learning’
  • 2022 IT Trends and Statistics
  • Joy Of Tech® ‘Superman’s Social Network Nightmare’

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Analytics & Intelligence DevOps Network Security Security Bloggers Network 

Home » Cybersecurity » Analytics & Intelligence » Clarifying the Misconceptions: Monitoring and Auditing for Container Security

SBN

Clarifying the Misconceptions: Monitoring and Auditing for Container Security

by David Bisson on October 11, 2018

An effective container security strategy consists of many parts. Organizations should first secure the build environment using secure code control along with build tools and controllers. Next, they should secure the contents of their containers using container validation, code analysis and security unit tests. Finally, they should develop a plan to protect their containers in production systems by focusing on runtime security, platform security and orchestration manager security.

DevOps Connect:DevSecOps @ RSAC 2022

But container security doesn’t end there. An effective security program consists of two other items, as well. These are monitoring and auditing.

Monitoring

All the container security processes mentioned above employ preventative security controls. These measures address known attack vectors with well-understood responses like vulnerability scans and encryption. But those and other security practices can only go so far, for they are designed to solve known issues. When it comes to detecting unexpected concerns, organizations can turn to monitoring to discover the unexpected stuff, track events in the environment and detect what’s broken.

Most monitoring tools begin by collecting events like requests for hardware resources and IP-based communication. They then examine them relative to the organization’s security policies. Towards this end, it’s best to use a monitoring solution that combines deterministic white and black list policies with dynamic behavior detection. This gives organizations the best of both worlds, allowing them to detect simple policy violations and unexpected variations.

For organizations to evaluate a monitoring tool, they should look to the following criteria:

  • Deployment model: How does the product collect events? Does it use an agent embedded in the host operating system or a privileged container-based monitor?
  • Policy management: How easy is it to build new policies or modify existing ones?
  • Behavioral analysis: What behavioral analysis options are there? How flexible are they?
  • Activity blocking: Does the solution provide (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/devops/clarifying-the-misconceptions-monitoring-and-auditing-for-container-security/

October 11, 2018October 11, 2018 David Bisson auditing, Container Security, DEVOPS, Featured Articles, Monitoring
  • ← XKCD, Internal Monologues
  • 5 Ways Attackers Are Targeting the Healthcare Industry →

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Most Read on the Boulevard

ADPPA US Privacy Law: Coming Soon in Wake of Roe v. Wade Redo
Hermit Previews Sophisticated Spyware To Come
House Passes ICS Cybersecurity Training Act
Russian Hackers Declare War on Lithuania — Killnet DDoS Panic
Using AI and ML to Fight Zero-Day Attacks
How Should API Keys be Stored?
Skimming, Shimming, and Threat Intel: The Relevance of Physical Fraud in Today’s Threat Landscape 
Secure Software Development – SDLC Best Practices
USENIX Enigma 2022 – Ram Shankar Siva Kumar’s ‘Why Has Your Toaster Been Through More Security Testing Than The AI System’
Top 5 Myths Of Cyber Security Debunked

Upcoming Webinars

Thu 30

Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines

June 30 @ 11:00 am - 12:00 pm
Jul 19

Finding the Ransomware Threat INSIDE Your Backups

July 19 @ 3:00 pm - 4:00 pm
Jul 25

Applying the 2022 Open Source Findings to Software Supply Chain Risk Management

July 25 @ 3:00 pm - 4:00 pm
Jul 27

How to Shift Security Left: Best Practices From a Fortune 500 DevSecOps Leader

July 27 @ 1:00 pm - 2:00 pm
Aug 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Industry Spotlight

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

June 17, 2022 Richi Jennings | Jun 17 0
Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Cybersecurity Governance, Risk & Compliance Industry Spotlight IoT & ICS Security Security Awareness Security Boulevard (Original) Threat Intelligence 

Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity

May 23, 2022 Mike Hodge | May 23 Comments Off on Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Establishing a Root of Trust in Embedded Linux and IoT
Cybersecurity Endpoint Industry Spotlight IoT & ICS Security Security Boulevard (Original) Vulnerabilities 

Establishing a Root of Trust in Embedded Linux and IoT

April 18, 2022 Anita Buehrle | Apr 18 Comments Off on Establishing a Root of Trust in Embedded Linux and IoT

Top Stories

Cerby Emerges From Stealth to Transform Application Security
Application Security Cybersecurity Endpoint Featured Identity & Access Mobile Security News Security Awareness Security Boulevard (Original) Spotlight 

Cerby Emerges From Stealth to Transform Application Security

June 28, 2022 Michael Vizard | Yesterday 0
Russian Hackers Declare War on Lithuania — Killnet DDoS Panic
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Endpoint Featured Governance, Risk & Compliance Identity & Access Identity and Access Management Incident Response IoT & ICS Security Malware Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Russian Hackers Declare War on Lithuania — Killnet DDoS Panic

June 28, 2022 Richi Jennings | Yesterday 0
ADPPA US Privacy Law: Coming Soon in Wake of Roe v. Wade Redo
Application Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Identity & Access Identity and Access Management IoT & ICS Security Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches 

ADPPA US Privacy Law: Coming Soon in Wake of Roe v. Wade Redo

June 27, 2022 Richi Jennings | 2 days ago 0

Security Humor

Joy Of Tech® ‘Superman's Social Network Nightmare'

Joy Of Tech® ‘Superman’s Social Network Nightmare’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.