{"id":12559,"date":"2018-06-13T07:00:03","date_gmt":"2018-06-13T15:00:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/06\/13\/news-6328\/"},"modified":"2018-06-13T07:00:03","modified_gmt":"2018-06-13T15:00:03","slug":"news-6328","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/06\/13\/news-6328\/","title":{"rendered":"Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check"},"content":{"rendered":"<p><strong>Credit to Author: Wendy Moore| Date: Wed, 13 Jun 2018 12:00:30 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"269\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/group-man-pointing-300x269.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/group-man-pointing-300x269.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/group-man-pointing-440x394.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/group-man-pointing-380x341.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/group-man-pointing.jpg 580w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Containers present a new opportunity for teams. An opportunity to deploy faster, more consistently, and with a simplicity rarely seen. But in order to make that happen a lot of infrastructure needs to be setup ahead of time.<\/p>\n<p>A cluster of hosts for the container runtime, an orchestration layer, and\u2014of course\u2014security throughout.<\/p>\n<p>To simplify this infrastructure, most teams turn to a cloud service provider like AWS. Complementing the power of the <a href=\"https:\/\/aws.amazon.com\/ecs\/\">Amazon Elastic Container Service (ECS<\/a><a href=\"https:\/\/aws.amazon.com\/ecs\/\">)<\/a>, the newly released <a href=\"https:\/\/aws.amazon.com\/eks\/\">Amazon Elastic Container Service for Kubernetes (EKS<\/a><a href=\"https:\/\/aws.amazon.com\/eks\/\">)<\/a> eliminates the operational burden of <a href=\"https:\/\/kubernetes.io\">Kubernete<\/a><a href=\"https:\/\/kubernetes.io\">s<\/a> from you container stack.<strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/aws\/\">Trend Micro Deep Securit<\/a><a href=\"https:\/\/www.trendmicro.com\/aws\/\">y<\/a> has long protected your Amazon ECS hosts with security controls applied at runtime. In 2017, that protection was extended to containers themselves, with the platform applying intrusion prevention and anti-malware controls to individual containers. This week we extended our container security solution with the launch of <a href=\"http:\/\/trendmicro.com\/smartcheck\">Deep Security Smart Check<\/a> to deliver container image scanning.<strong>\u00a0<\/strong><\/p>\n<p><strong>Shift Left With Deep Security Smart Check<\/strong><strong>\u00a0<\/strong><\/p>\n<p>Protecting containers in production is a critical play in your security playbook. But what about earlier in the development process? How can you reduce the cost and impact of security issues?<\/p>\n<p>The answer is to catch them earlier in the development process. You need to shift security controls to the left side of the CI\/CD pipeline. The introduction of <a href=\"http:\/\/trendmicro.com\/smartcheck\">Deep Security Smart Check<\/a> does just that.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-541425 aligncenter\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-1.jpg\" alt=\"\" width=\"686\" height=\"385\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-1.jpg 1000w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-1-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-1-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-1-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-1-900x506.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-1-440x247.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-1-380x214.jpg 380w\" sizes=\"auto, (max-width: 686px) 100vw, 686px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Deep Security Smart Check is a new image scanner for containers. By connecting to popular private and cloud registries\u2014including Amazon ECR\u2014it continuously scans images for vulnerabilities and malware.<\/p>\n<p>Deep Security Smart Check is designed to seamlessly slide into your CI\/CD pipeline to make automated decisions not only based on failed integration and unit tests, but security tests, as well.<strong>\u00a0<\/strong><\/p>\n<p><strong>Automate for Success<\/strong><strong>\u00a0<\/strong><\/p>\n<p>The speed of your development process hinges on automation. Adding security earlier in the CI\/CD pipeline poses the risk of slowing the entire pipeline down. That outcome must be avoided at all costs.<\/p>\n<p>Deep Security Smart Check helps you accelerate your CI\/CD pipeline via its complete API. You can use this API to added scanning to your container build process as a step before publication.<\/p>\n<p>If the container passes a smart check, you can automatically sign it and promote it to your registry of choice. If it fails, you can send detailed results to your favorite collaboration tool like Slack or ServiceNow.<\/p>\n<p>This eliminates the need for manual security processes and facilitates a streamlined lifecycle for your containers.<strong>\u00a0<\/strong><\/p>\n<p><strong>How it Works<\/strong><strong>\u00a0<\/strong><\/p>\n<p>Here\u2019s a simple example of how you can build security into your CI\/CD pipeline:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-541426 aligncenter\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog2.jpg\" alt=\"\" width=\"1000\" height=\"562\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog2.jpg 1000w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog2-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog2-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog2-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog2-900x506.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog2-440x247.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog2-380x214.jpg 380w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Code is committed to GitHub and Jenkins automatically builds your custom container.<\/li>\n<li>Deep Security Smart Check scans the container for malware and vulnerabilities.<\/li>\n<li>Smart Check\u2019s Image Assertion feature signs and promotes images that meet security requirements to your registry of choice. Image Assertion lets you define your policy based on the risk inherent in specific malware and vulnerability profiles.<\/li>\n<li>Deep Security \u2014running on your Amazon ECS hosts\u2014 integrates with Kubernetes via an initializer to intercept pod deployments, verifying and enforcing Deep Security runtime policies.<\/li>\n<li>Your container is deployed to production with no known vulnerabilities or malware and under the full protection of Deep Security runtime protection.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Fully Embracing AWS<\/strong><\/p>\n<p>As a long time AWS Advanced Technology Partner, Trend Micro has supported a number of critical AWS service launches and programs. The launch of Amazon EKS is no exception.<\/p>\n<p>One of the most eagerly awaited services, Amazon EKS is Kubernetes at scale with little-to-no effort on your part.<\/p>\n<p>A fully managed service that is highly available and highly redundant, Amazon EKS delivers Kubernetes clusters that are secure, Certified Kubernetes Conformant, and compatible with the rest of the K8S ecosystem.<\/p>\n<p>It\u2019s the simplest way to get K8S up and running in the AWS Cloud. In fact, Deep Security Smart Check itself is container based and Amazon EKS can be used to manage it as an EKS cluster because Trend Micro is always striving to deliver simplicity to our customers and fit their processes.<\/p>\n<p>When you combine Amazon EKS with Amazon ECS, you get a one-two punch that simplifies your container environment. But under the shared responsibility model, even with these fantastic services you are still responsible for the security of the contents of your containers, your data, and the service configuration.<\/p>\n<p>You\u2019ll need to leverage AWS IAM and other AWS Cloud security features to harden your deployments. That still leaves a gap, one that is addressed by Trend Micro Deep Security and Deep Security Smart Check.<\/p>\n<p><strong>Do Less, Get More<\/strong><\/p>\n<p>The goal of using containers is to simplify and accelerate your deployments. If you try to use traditional security platforms to protect your deployments, you are going to slow down your CI\/CD pipeline while forcing your teams to jump through needless security hoops.<\/p>\n<p>A modern set of security tools will seamlessly support and improve your CI\/CD pipeline by shifting left into the development cycle and simultaneously providing protection for containers running in your production environment.<\/p>\n<p>The new Deep Security Smart Check image scanner in combination with the Deep Security platform is a fantastic example of this approach.<\/p>\n<p>With full support for on-premises and hybrid environments, this security combination will protect your container deployments wherever they run.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/securing-containers-at-scale-amazon-eks-amazon-ecs-and-deep-security-smart-check\/\">Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/securing-containers-at-scale-amazon-eks-amazon-ecs-and-deep-security-smart-check\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Wendy Moore| Date: Wed, 13 Jun 2018 12:00:30 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"269\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/group-man-pointing-300x269.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/group-man-pointing-300x269.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/group-man-pointing-440x394.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/group-man-pointing-380x341.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/group-man-pointing.jpg 580w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Containers present a new opportunity for teams. An opportunity to deploy faster, more consistently, and with a simplicity rarely seen. But in order to make that happen a lot of infrastructure needs to be setup ahead of time. A cluster of hosts for the container runtime, an orchestration layer, and\u2014of course\u2014security throughout. To simplify this&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/securing-containers-at-scale-amazon-eks-amazon-ecs-and-deep-security-smart-check\/\">Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[18724,18725,12010,18726,18727,714],"class_list":["post-12559","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-amazon-ecs","tag-amazon-elastic-container-service-for-kubernetes-eks","tag-aws","tag-containers","tag-deep-security-smart-check","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12559"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12559\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12559"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}