{"id":7373,"date":"2017-04-18T04:00:33","date_gmt":"2017-04-18T12:00:33","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/18\/news-1164\/"},"modified":"2017-04-18T04:00:33","modified_gmt":"2017-04-18T12:00:33","slug":"news-1164","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/18\/news-1164\/","title":{"rendered":"Setting Sail with Docker"},"content":{"rendered":"<p><strong>Credit to Author: Justin Foster| Date: Tue, 18 Apr 2017 12:00:18 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-1-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-1-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-1-440x293.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-1-380x253.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-1.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>This week thousands of people are heading to Austin, Texas for <a href=\"http:\/\/2017.dockercon.com\/\">DockerCon 2017<\/a>. Docker\u2019s popularity has been explosive, with thousands of organizations using it\u2019s platform to modernize applications, build microservices, optimize infrastructure and embrace a true DevOps practice.<\/p>\n<p>Like any transformation, moving to Docker is a journey for an organization. In preparation for sailing on the high seas, it\u2019s important to know how to secure your containers for the voyage.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-538964 size-full\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-2.png\" alt=\"\" width=\"855\" height=\"501\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-2.png 855w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-2-300x176.png 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-2-768x450.png 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-2-640x375.png 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-2-440x258.png 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-2-380x223.png 380w\" sizes=\"auto, (max-width: 855px) 100vw, 855px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>As we have discussed before on Simply Security, Containers are a part of an <a href=\"http:\/\/blog.trendmicro.com\/server-security-stands-test-time\/\">evolution of computing<\/a>. As we move along this spectrum, workloads are shrinking in size as developers increasingly embrace microservices. Virtualization offered application templates that were an entire VM, cloud introduced newer forms of building stateless servers dynamically, but containers standardize and compartmentalize the application in a highly efficient and portable way.<\/p>\n<p>With the adoption of these modern environments, security too has adapted. For virtualization, we saw the first agentless approach to file and network security. With cloud, we supported auto scaling and consumption licensing. For Docker, security is evolving to provide container visibility and able to protect the Docker host and the containers it supports.<\/p>\n<p>In addition to application portability, Docker introduced a standardized means of application distribution, the registry. Developers use a CI\/CD pipeline to push images to the registry and\u00a0from there, container orchestration tools like <a href=\"https:\/\/www.docker.com\/get-docker\">Docker Swarm<\/a> or <a href=\"https:\/\/kubernetes.io\/\">Kubernetes<\/a> are used to deploy, manage, and scale container workloads. This separation of duties is your first step towards securing a Docker-based application environment. Developers only have the ability to push images, where operations use these images to ensure the application is highly available and serving your users. With DevOps, these roles may be in the same team, but applying the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Principle_of_least_privilege\">principals of least privilege<\/a> is always good practice.<strong>\u00a0<\/strong><\/p>\n<p>Next is the runtime application itself. Like anything else in the computing world, Docker-based deployments and the applications running in them, while largely instrumental in innovation, remains imperfect. These imperfections come in the form of operating system vulnerabilities, application logic flaws that introduce injection or spoofing attacks, or malicious insiders This is where applying compensation like Intrusion Prevention, File Integrity Monitoring, Log Analysis and other techniques comes in. It is very important that any solution understand how to protect both the Docker host and the containers running on it.<\/p>\n<p>Docker environments mean rapid deployment and iteration. Some Docker users ship application updates over a hundred times a day! It\u2019s important in this type of dynamic environment to choose a tool that adapts to changes and provides visibility into your Docker workloads. Furthermore, If your application has sensitive data, you may be subject to compliance standards. Choosing a security tool designed for continuous compliance will be your best path to avoiding headaches during an audit. With your containers secured, it\u2019s only smooth sailing thereon out.<strong>\u00a0<\/strong><\/p>\n<p>Organizations are setting sail for a container world faster than ever. These are just a few of the tips to help you with the choppy seas to ensure a safe and secure voyage with Docker.<\/p>\n<p>If you are at DockerCon in Austin this week, stop by and see us at Booth S30! Our team can show you how we add layered security to the Docker host and the containers.\u00a0 Find out more at <a href=\"http:\/\/www.trendmicro.com\/hybridcloud\">www.trendmicro.com\/hybridcloud<\/a>.<\/p>\n<p>If you have questions or comments, please post them below or follow me on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/justin_foster\">@justin_foster<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/setting-sail-docker\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Justin Foster| Date: Tue, 18 Apr 2017 12:00:18 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-1-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-1-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-1-440x293.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-1-380x253.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/04\/docker-image-1.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>This week thousands of people are heading to Austin, Texas for DockerCon 2017. Docker\u2019s popularity has been explosive, with thousands of organizations using it\u2019s platform to modernize applications, build microservices, optimize infrastructure and embrace a true DevOps practice. Like any transformation, moving to Docker is a journey for an organization. In preparation for sailing on&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[714,11758],"class_list":["post-7373","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-security","tag-virtualization"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7373"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7373\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}