• NEWS
  • INDUSTRY SPOTLIGHT
  • SECURITY BLOGGERS NETWORK
    • ANALYTICS
    • APPSEC
    • CISO
    • CLOUD
    • DEVOPS
    • GRC
    • IDENTITY
    • IDENTITY RESPONSE
    • IOT / ICS
    • THREAT / BREACHES
    • MORE
      • BLOCKCHAIN / DIGITAL CURRENCIES
      • CAREERS
      • CYBERLAW
      • HUMOR
      • MOBILE SECURITY
      • SOCIAL ENGINEERING
  • CHATS
  • LIBRARY
  • WEBINARS
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • Homepage
  • Security Bloggers Network

Clarifying the Misconceptions: Monitoring and Auditing for Container Security

An effective container security strategy consists of many parts. Organizations should first secure the build environment using secure code control along with build tools and controllers. Next, they should secure the contents of their containers using container validation, code analysis and security unit tests. Finally, they should develop a plan to protect their containers in production systems by focusing on runtime security, platform security and orchestration manager security.

But container security doesn’t end there. An effective security program consists of two other items, as well. These are monitoring and auditing.

Monitoring

All the container security processes mentioned above employ preventative security controls. These measures address known attack vectors with well-understood responses like vulnerability scans and encryption. But those and other security practices can only go so far, for they are designed to solve known issues. When it comes to detecting unexpected concerns, organizations can turn to monitoring to discover the unexpected stuff, track events in the environment and detect what’s broken.

Most monitoring tools begin by collecting events like requests for hardware resources and IP-based communication. They then examine them relative to the organization’s security policies. Towards this end, it’s best to use a monitoring solution that combines deterministic white and black list policies with dynamic behavior detection. This gives organizations the best of both worlds, allowing them to detect simple policy violations and unexpected variations.

For organizations to evaluate a monitoring tool, they should look to the following criteria:

  • Deployment model: How does the product collect events? Does it use an agent embedded in the host operating system or a privileged container-based monitor?
  • Policy management: How easy is it to build new policies or modify existing ones?
  • Behavioral analysis: What behavioral analysis options are there? How flexible are they?
  • Activity blocking: Does the solution provide (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/devops/clarifying-the-misconceptions-monitoring-and-auditing-for-container-security/

Tags: auditingContainer SecurityDEVOPSFeatured ArticlesMonitoring
2 years ago
David Bisson

Related Post

  • DevSecOps: 4 Reasons You Need One

    Those familiar with the world of software and application development are probably aware of the…

  • DataSecOps: Protecting Data in the Cloud

    DataSecOps melds an automated mechanism to manage data, along with security, in an effective operations…

  • Sonrai CEO: Next Phase of DevSecOps Starts Now

    Organizations of all sizes need to start shifting toward a new phase of DevSecOps that…

Recent Posts

  • Cybersecurity
  • Data Security
  • Featured
  • Incident Response
  • Network Security
  • News
  • Security Boulevard (Original)
  • Spotlight
  • Threats & Breaches

EU Vaccine Regulator Hacked for Pfizer/BioNTech Info

The European Medicines Agency (EMA) says it was hacked by persons unknown.

38 mins ago
  • Press Releases

NewDay Scores with TigerGraph Cloud to Fight Financial Fraud

Leading UK Credit Card Consumer Finance Company Uses Advanced Graph Analytics to Intercept Fraudulent Credit Card Applications, Boost Anti-Fraud Efforts…

2 hours ago
  • Press Releases
  • Press Releases

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…

4 hours ago
  • Security Bloggers Network

The Hacker Mind Podcast: Hacking OpenWRT

For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…

4 hours ago
  • Data Security
  • Security Bloggers Network

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…

4 hours ago
  • Network Security
  • Security Bloggers Network

Being a Defender

1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends,…

5 hours ago
  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • t