{"id":15218,"date":"2019-04-30T06:00:04","date_gmt":"2019-04-30T14:00:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/04\/30\/news-8967\/"},"modified":"2019-04-30T06:00:04","modified_gmt":"2019-04-30T14:00:04","slug":"news-8967","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/04\/30\/news-8967\/","title":{"rendered":"The Next Enterprise Challenge: How Best to Secure Containers and Monolithic Apps Together, Company-wide"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Tue, 30 Apr 2019 13:00:51 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><em>Submitted by: Adam Boyle, Head of Product Management, Hybrid Cloud Security, Trend Micro<\/em><\/p>\n<p>When it comes to software container security, it\u2019s important for enterprises to look at the big picture, taking into account how they see containers effecting their larger security requirements and future DevOps needs.\u00a0Good practices can help security teams build a strategy that allows them to mitigate pipeline and runtime data breaches and threats without impacting the agility and speed of application DevOps teams.<\/p>\n<p>Security and IT professionals need to address security gaps across agile and fast pace DevOps teams but are challenged by decentralized organizational structures and processes. And since workloads and environments are constantly changing, there\u2019s no silver bullet when it comes to cybersecurity, there\u2019s only the info we have right now. To help address the current security landscape, and where containers fit in, we need to ask ourselves a few key insightful questions.<\/p>\n<p><strong>How have environments for workloads changed and what are development teams focused on today? (i.e. VMs to cloud to serverless &gt; DevOps, microservices, measured on delivery and uptime).<\/strong><\/p>\n<p>Many years ago, the customer conversations that we were having were primarily around cloud migration of traditional, legacy workloads from the data center to the cloud. While performing this \u201cforklift,\u201d they had to figure out what IT tools, including security, would operate naturally in the cloud. Many traditional tools they had already purchased previously, before the cloud migration, didn\u2019t quite work out when expanded to the cloud, as they weren\u2019t designed with the cloud in mind.<\/p>\n<p>In the last few years, those same customers who migrated workloads to the cloud, started new projects and applications using cloud native services, and building these new capabilities on Docker, and serverless technologies such as AWS Lambda, Azure functions, and Google Cloud functions. These technologies have enabled teams to adopt DevOps practices where they can essentially continuously deliver \u201cparts\u201d of applications independently of one and other, ultimately delivering outcome much faster to market than one would with a monolithic application. The new projects have given birth to CI\/CD pipelines leveraging Git for source code management (using hosted versions from either GitHub or BitBucket), Jenkins, or Bamboo for DevOps automation, and Kubernetes for automated deployment, scaling, and management of containers.<\/p>\n<p>Both of these thrusts are now happening in parallel driving two distinct classes of applications\u2014legacy, monolithic applications, and cloud native microservices. The questions for an enterprise are simple; how do I protect all of this? And, how can I do this at scale?<\/p>\n<p>What\u2019s worth mentioning is also the maturity of IT and how these teams have evolved into leveraging \u201cinfrastructure as code.\u201d That is, writing code to automate IT operations. This includes security as code or writing code to automate <em>security<\/em>. Cloud operations teams have embraced automation and have partnered with application teams to help scale the automation of DevOps driven applications while meeting IT requirements. Technologies like Chef, Puppet, Ansible, Terraform, and Saltstack are popular in our customer base when automating IT operations.<\/p>\n<p><strong>While vulnerabilities and threats will always persist, what is the bigger impact on the organization when it comes to DevOps teams and security?<\/strong><\/p>\n<p>What we hear when companies talk to us is that the enterprise is not designed to do security at scale for a large set of DevOps teams who are continuously doing build-&gt;ship-&gt;run and need continuous and uninterrupted protection.<\/p>\n<p>A typical enterprise has a centralized IT and Security Ops teams who are serving many groups of internal customers, typically business units which are responsible for generating the revenue for the enterprise.<\/p>\n<p>So, how do tens or hundreds of DevOps teams who continuously build-&gt;ship-&gt;run, interact with centralized IT and security Ops teams, at scale? How do IT and security Ops teams embrace these practices and technologies, and ensure that they are secure\u2014both the CI\/CD pipelines and the runtime environments?<\/p>\n<p>These relationships between IT teams (including security teams), and the business units have largely been at an executive level (VP and up), but to deliver \u201csecure\u201d outcomes continuously\u2014a more effective, a more automated interplay\u2014between these teams are needed.<\/p>\n<p>We see many DevOps teams across business units incorporating security with varying degrees of rigor\u2014or buying their own security solutions that only work for their set of projects\u2014purchased out of their business unit budgets, implementing them with limited security experience and no tie-back to corporate security requirements or IT awareness. This leads to a fragmented, duplicated, complicated, inconsistent security posture across the enterprise and higher cost models on security tools that becomes more complicated to manage and support. The pressure to deliver faster within a business unit is sometimes at the cost of a coordinated enterprise-wide security plan\u2026we\u2019ve all been there and there\u2019s often a balance that needs to be found.<\/p>\n<p>The relationship, at the working level, between business unit application teams and centralized IT and security Ops teams is not always a collaborative, healthy, working relationship. Sometimes it has friction. Sometimes, the root cause of this friction can be related to application teams having significantly higher understanding of DevOps practices, tools, along with higher understanding of technologies, such as Docker, Kubernetes, and various serverless technologies, than their IT counterparts. We\u2019ve seen painful, unproductive discussions between application teams trying to educate their IT\/Security teams on the basics, let alone, get them on board with doing things differently. The friction increases if the IT and security Ops teams don\u2019t embrace the changes in their approach when it comes to container and serverless security. So, to us, the biggest impact right now is if a DevOps team wants to deliver continuously while following an enterprise-wide approach, then they need a continuous relationship with the IT and security operations teams, whom must become well educated in DevOps practices and tools, and microservices technologies (Docker, Kubernetes, etc), where the teams work together to automate security across pipelines and runtime environments. And, the IT and security teams need to level up their skills sets to DevOps and all associated technologies, and help teams move faster, not slower, <em>while<\/em> meeting security requirements.<\/p>\n<p>To be true DevOps, the \u201cDev\u201d part would be the application team, the \u201cOps\u201d part would be ideally IT\/security and they would work together. So, we think there could be some pretty big shifts on how enterprises organize their development teams and IT\/security Ops teams as the traditional organizational models favor delivery of monolithic, legacy applications that do not do continuous delivery.<\/p>\n<p>The biggest opportunity for IT\/security Ops teams is engage the application teams with a set of self-service tools and practices that are positioned to help the teams move<em> faster<\/em>, while meeting the IT and security requirements for the enterprise.<\/p>\n<p><strong>How can DevOps teams take advantage of the best security measures to better protect emerging technologies like container environments and their supporting tools?<\/strong><\/p>\n<p>Well this could easily be a book! However, let\u2019s try to summarize at a high level and break this down into \u201cbuild,\u201d \u201cship,\u201d and \u201crun.\u201d By no means is this a complete list, but enough to get started. For more information, <a href=\"https:\/\/resources.trendmicro.com\/Hybrid-Cloud-Security-Contact-Us.html\">contact us<\/a><\/p>\n<p>Security teams have fantastic opportunity to introduce the following services across the enterprise, for all teams with pipelines and runtimes, in a consistent way.<\/p>\n<p><strong>Build<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Identification of all source code repositories and CI\/CD pipelines across the enterprise, and their owners.<\/li>\n<li>Static code analysis.<\/li>\n<li>Image scanning for malware.<\/li>\n<li>Image scanning for vulnerabilities.<\/li>\n<li>Image scanning for configuration assessments (ensure images are hardened).<\/li>\n<li>Indicator of Compromise (IoC) queries across all registries.<\/li>\n<li>Secrets detection.<\/li>\n<li>Automated security testing in staged environments, with generic and custom test suites.<\/li>\n<li>Image Assertion \u2013 declaring an image to be suitable for the next stage of the lifecycle based on the results of scans, tests, etc.<\/li>\n<li>Provide reporting to both application teams and security teams on security scorecards.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Ship<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Admission control \u2013 the allowance or blocking of images to runtime environments based on security policies, image assertion, and\/or signed images.<\/li>\n<li>Vulnerability shielding of containers \u2013 Trend Micro will be releasing this capability later this year.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Run<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Runtime protection of Docker and Kubernetes, including anomaly detection of abnormal changes or configurations.<\/li>\n<li>Hardening of Kubernetes and Docker.<\/li>\n<li>Using Kubernetes network policy capabilities for micro-segmentation, and not a third-party solution. Then, ensure Kubernetes is itself protected.<\/li>\n<li>Container host-based protection\u2014covering malware, vulnerabilities, application control, integrity monitoring, and log inspection\u2014for full stack defense of the applications and the host itself.<\/li>\n<li>Kubernetes pod-based protection (privileged container \u2013 one per pod). This can be shipped into Kubernetes environments just like any other container, and no host-based agent is required.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>For serverless containers and serverless, application protection in every image or serverless function (AppSec library focusing on RASP, OWASP, malware, and vulnerabilities inside the application execution path). Trend Micro will be releasing an offer later this year to address this.<\/p>\n<p>Trend Micro provides a stronger and more robust full lifecycle approach to container security. This approach helps application teams meet compliance and IT security requirements for continuous delivery in CI\/CD pipelines and runtime environments. With multiple security capabilities, complete automation resources, and world class threat intelligence research teams, Trend Micro is a leader in the cybersecurity needs of today\u2019s application and container driven organizations.<\/p>\n<p>Learn more at <a href=\"http:\/\/www.trendmicro.com\/containers\">www.trendmicro.com\/containers<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/the-next-enterprise-challenge-how-best-to-secure-containers-and-monolithic-apps-together-company-wide\/\">The Next Enterprise Challenge: How Best to Secure Containers and Monolithic Apps Together, Company-wide<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/the-next-enterprise-challenge-how-best-to-secure-containers-and-monolithic-apps-together-company-wide\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Tue, 30 Apr 2019 13:00:51 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/2018121200333118-138-1TIH271-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Submitted by: Adam Boyle, Head of Product Management, Hybrid Cloud Security, Trend Micro When it comes to software container security, it\u2019s important for enterprises to look at the big picture, taking into account how they see containers effecting their larger security requirements and future DevOps needs.\u00a0Good practices can help security teams build a strategy that&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/the-next-enterprise-challenge-how-best-to-secure-containers-and-monolithic-apps-together-company-wide\/\">The Next Enterprise Challenge: How Best to Secure Containers and Monolithic Apps Together, Company-wide<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[11728,11146,21669,18728,20251,18681,714,11331],"class_list":["post-15218","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cloud","tag-cloud-security","tag-container-security","tag-devops","tag-docker","tag-kubernetes","tag-security","tag-serverless"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15218"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15218\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}