SlideShare a Scribd company logo
Open-Source Tools for Security
and Compliance with Docker
Zach Hill
Principal Engineer, Anchore Inc.
2/13/2016
Containers require an
updated approach
Lots of external inputs
October 2016:
6 Billion pulls from Docker Hub
Over 375,000 public images
and growing ...
3
Image Scanning
source: https://www.banyanops.com/pdf/BanyanOps-AnalyzingDockerHub-WhitePaper.pdf
4
Several vendors offer image scanning as part of their
solution: registry providers, SDLC infrastructure,
Security solutions, etc.
Typically a secondary feature
that focuses on CVE Scanning
Image Scanning Space
5
Image scanning: What’s in that
container?
6
● Application container? Are you sure?
● Simplest: packages and CVEs
● ADD? COPY?
● Dockerfile?
● Gems, NPMs, jars
● id_rsa? .aws/credentials?
Analysis and reporting on
operating system packages:
- required packages
- blacklisted packages
- non-official packages
- required package versions
- available updates that address
non-security bugs
Artifacts that should not be present in your
image such as source code, secrets (API
keys, passwords, etc)
Images may contain many 3rd party
components not provided by the operating
system vendor such as
- Node.js NPM,
- Ruby GEMs
- Python PIP
- PERL CPAN
- Java Archives.
Configuration files for the operating system,
middleware and application components
Image configuration such as the Dockerfile
should be validated to ensure that it
complies with best practices and your
corporate standards.
Any element in the image can be checked
including file permissions, presence of
unpackaged files that are not part of
standard packages or libraries.
Image Signing?
8
necessary < signing < sufficient
“Compliance”?
Traditional Def
• Externally defined, externally audited
• PCI, HIPAA, etc
General compliance: your org’s requirements
• Driven by your ops and environment requirements
• Best-practices audits and enforcement
Define your criteria and enforce/monitor them
• How image is constructed & final output image
• Block usage or just notify? Your choice
• Integrate where it makes sense for your workflow
• No registry or platform requirements
9
Open-Source Analysis and Policy for container images
• Policy-Driven
• Deep inspection of container image
• General framework, not just security
• Only depends on Docker
• github.com/anchore/anchore
Open-Source and Extensible
• Easily add your own scripts to any stage
• Similar to SystemV Init Scripts: drop code in the right place and it just works
Ecosystem monitoring and alerting
• Navigate and keep track of the image ecosystem: online Navigator for UI and notification of public images
Anchore Overview
10
Anchore Overview
11
Anchore Navigator:
http://anchore.io
Anchore CLI Tools:
● pip install anchore
● docker run anchore/cli
Jenkins Plugin
Image Discovery
Notifications
Monitor dependent images
Local analysis, policy, gates
Build local db
Local policy enforcement and definition
Public
Registries
Why does Open-Source Matter for
Security?
1
2
Trust, but verify
Gates:
Analysis + Policy
• Use analysis output and gate modules to
define and detect trigger conditions
• Evaluate trigger conditions against user
policy to emit actions (GO|WARN|STOP)
Queries:
Examine analysis data
directly at any time
• Query modules run against the
analysis db only
• Diffs, multi-image queries,
statistics, etc
Anchore Engine Flow
13
Analysis:
Extract Image Metadata and
Data
• Examine the image itself and extract
data like files, pkgs, etc
• Includes Dockerfile analysis
• No actions
Navigator: anchore.io
CLI:
github.com/anchore
INTEGRATED INTO BUILD PIPELINES
16
CI/CD: Jenkins Plugin
Questions ?
GITHUB.COM/ANCHORE @ANCHORE
ANCHORE.COM
INFO@ANCHORE.COM#anchore on freenode
ANCHORE.IO

More Related Content

What's hot (20)

PDF
Docker Security - Secure Container Deployment on Linux
Michael Boelen
 
PPTX
Docker Container Security
Suraj Khetani
 
PDF
Container Security Deep Dive & Kubernetes
Aqua Security
 
PDF
Docker London: Container Security
Phil Estes
 
PDF
How Secure Is Your Container? ContainerCon Berlin 2016
Phil Estes
 
PDF
5 Ways to Secure Your Containers for Docker and Beyond
Black Duck by Synopsys
 
PPTX
Container security
Anthony Chow
 
PDF
Docker Security and Content Trust
ehazlett
 
PDF
How abusing the Docker API led to remote code execution same origin bypass an...
Aqua Security
 
PDF
DockerCon SF 2015: Docker Security
Docker, Inc.
 
PDF
Docker Security - Continuous Container Security
Dieter Reuter
 
PDF
Docker Security: Are Your Containers Tightly Secured to the Ship?
Michael Boelen
 
PPTX
Security best practices for kubernetes deployment
Michael Cherny
 
PDF
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
Docker, Inc.
 
PPTX
Csa container-security-in-aws-dw
Cloud Security Alliance, UK chapter
 
PDF
Docker security: Rolling out Trust in your container
Ronak Kogta
 
PPTX
An In-depth look at application containers
John Kinsella
 
PDF
Docker and kernel security
smart_bit
 
PDF
Container Runtime Security with Falco
Michael Ducy
 
PDF
Security of Linux containers in the cloud
Dobrica Pavlinušić
 
Docker Security - Secure Container Deployment on Linux
Michael Boelen
 
Docker Container Security
Suraj Khetani
 
Container Security Deep Dive & Kubernetes
Aqua Security
 
Docker London: Container Security
Phil Estes
 
How Secure Is Your Container? ContainerCon Berlin 2016
Phil Estes
 
5 Ways to Secure Your Containers for Docker and Beyond
Black Duck by Synopsys
 
Container security
Anthony Chow
 
Docker Security and Content Trust
ehazlett
 
How abusing the Docker API led to remote code execution same origin bypass an...
Aqua Security
 
DockerCon SF 2015: Docker Security
Docker, Inc.
 
Docker Security - Continuous Container Security
Dieter Reuter
 
Docker Security: Are Your Containers Tightly Secured to the Ship?
Michael Boelen
 
Security best practices for kubernetes deployment
Michael Cherny
 
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
Docker, Inc.
 
Csa container-security-in-aws-dw
Cloud Security Alliance, UK chapter
 
Docker security: Rolling out Trust in your container
Ronak Kogta
 
An In-depth look at application containers
John Kinsella
 
Docker and kernel security
smart_bit
 
Container Runtime Security with Falco
Michael Ducy
 
Security of Linux containers in the cloud
Dobrica Pavlinušić
 

Viewers also liked (12)

PPTX
Docker Security workshop slides
Docker, Inc.
 
PDF
Monetising Your Skill
'Detola Amure
 
PDF
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
DynamicInfraDays
 
PDF
How GitLab and HackerOne help organizations innovate faster without compromis...
HackerOne
 
PDF
Atomic CLI scan
Lalatendu Mohanty
 
PDF
Why You Need to Rethink Container Security
FlawCheck
 
PDF
Introduction to Infrastructure as Code & Automation / Introduction to Chef
Nathen Harvey
 
PPTX
AWS Security Architecture - Overview
Sai Kesavamatham
 
PPTX
Monitoring, Logging and Tracing on Kubernetes
Martin Etmajer
 
PDF
London HUG 19/5 - Kubernetes and vault
London HashiCorp User Group
 
PDF
Container Orchestration Wars
Karl Isenberg
 
PPTX
Docker Security Overview
Sreenivas Makam
 
Docker Security workshop slides
Docker, Inc.
 
Monetising Your Skill
'Detola Amure
 
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
DynamicInfraDays
 
How GitLab and HackerOne help organizations innovate faster without compromis...
HackerOne
 
Atomic CLI scan
Lalatendu Mohanty
 
Why You Need to Rethink Container Security
FlawCheck
 
Introduction to Infrastructure as Code & Automation / Introduction to Chef
Nathen Harvey
 
AWS Security Architecture - Overview
Sai Kesavamatham
 
Monitoring, Logging and Tracing on Kubernetes
Martin Etmajer
 
London HUG 19/5 - Kubernetes and vault
London HashiCorp User Group
 
Container Orchestration Wars
Karl Isenberg
 
Docker Security Overview
Sreenivas Makam
 
Ad

Similar to Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13 (20)

PDF
Adding Container Image Scanning to Your Codefresh Pipelines with Anchore
Codefresh
 
PDF
Anchore webinar thursday 21st july 2016
Christian Wiens
 
PDF
Anchore webinar thursday 21st july 2016
Anchore
 
PDF
Anchore Engine
Knoldus Inc.
 
PDF
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
NUS-ISS
 
PDF
Navigating container technology for enhanced security by Niklas Saari
Metosin Oy
 
PDF
Managing Open Source software in the Docker era
nexB Inc.
 
PDF
Security Patterns for Microservice Architectures - SpringOne 2020
Matt Raible
 
PDF
Security Patterns for Microservice Architectures
VMware Tanzu
 
PDF
OSDC 2016 - Inspecting Security of Docker formatted Container Images to find ...
NETWAYS
 
PPTX
Workshop: Hands-On Container Image Security Mastering Sigstore for Unbreachab...
Cloud Village
 
PDF
Expert Series: Solving Real-World Challenges in FedRAMP Compliance
Anchore
 
PDF
Amazon Container 환경의 보안 – 최인영, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집
Amazon Web Services Korea
 
PDF
Testing Docker Images Security
Jose Manuel Ortega Candel
 
PDF
AWS live hack: Docker + Snyk Container on AWS
Eric Smalling
 
PDF
Strategy, planning and governance for enterprise deployments of containers - ...
The Incredible Automation Day
 
PDF
Docker Enterprise Deployment Planning
Stephane Woillez
 
PDF
BSides SF talk on Docker Images Security - Feb 13, 2017
Manideep Konakandla
 
PDF
So. many. vulnerabilities. Why are containers such a mess and what to do abou...
Eric Smalling
 
PDF
Is Docker Secure?
Manideep Konakandla
 
Adding Container Image Scanning to Your Codefresh Pipelines with Anchore
Codefresh
 
Anchore webinar thursday 21st july 2016
Christian Wiens
 
Anchore webinar thursday 21st july 2016
Anchore
 
Anchore Engine
Knoldus Inc.
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
NUS-ISS
 
Navigating container technology for enhanced security by Niklas Saari
Metosin Oy
 
Managing Open Source software in the Docker era
nexB Inc.
 
Security Patterns for Microservice Architectures - SpringOne 2020
Matt Raible
 
Security Patterns for Microservice Architectures
VMware Tanzu
 
OSDC 2016 - Inspecting Security of Docker formatted Container Images to find ...
NETWAYS
 
Workshop: Hands-On Container Image Security Mastering Sigstore for Unbreachab...
Cloud Village
 
Expert Series: Solving Real-World Challenges in FedRAMP Compliance
Anchore
 
Amazon Container 환경의 보안 – 최인영, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집
Amazon Web Services Korea
 
Testing Docker Images Security
Jose Manuel Ortega Candel
 
AWS live hack: Docker + Snyk Container on AWS
Eric Smalling
 
Strategy, planning and governance for enterprise deployments of containers - ...
The Incredible Automation Day
 
Docker Enterprise Deployment Planning
Stephane Woillez
 
BSides SF talk on Docker Images Security - Feb 13, 2017
Manideep Konakandla
 
So. many. vulnerabilities. Why are containers such a mess and what to do abou...
Eric Smalling
 
Is Docker Secure?
Manideep Konakandla
 
Ad

Recently uploaded (20)

PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
Python basic programing language for automation
DanialHabibi2
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
July Patch Tuesday
Ivanti
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Python basic programing language for automation
DanialHabibi2
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
July Patch Tuesday
Ivanti
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 

Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13

  • 1. Open-Source Tools for Security and Compliance with Docker Zach Hill Principal Engineer, Anchore Inc. 2/13/2016
  • 3. Lots of external inputs October 2016: 6 Billion pulls from Docker Hub Over 375,000 public images and growing ... 3
  • 5. Several vendors offer image scanning as part of their solution: registry providers, SDLC infrastructure, Security solutions, etc. Typically a secondary feature that focuses on CVE Scanning Image Scanning Space 5
  • 6. Image scanning: What’s in that container? 6 ● Application container? Are you sure? ● Simplest: packages and CVEs ● ADD? COPY? ● Dockerfile? ● Gems, NPMs, jars ● id_rsa? .aws/credentials?
  • 7. Analysis and reporting on operating system packages: - required packages - blacklisted packages - non-official packages - required package versions - available updates that address non-security bugs Artifacts that should not be present in your image such as source code, secrets (API keys, passwords, etc) Images may contain many 3rd party components not provided by the operating system vendor such as - Node.js NPM, - Ruby GEMs - Python PIP - PERL CPAN - Java Archives. Configuration files for the operating system, middleware and application components Image configuration such as the Dockerfile should be validated to ensure that it complies with best practices and your corporate standards. Any element in the image can be checked including file permissions, presence of unpackaged files that are not part of standard packages or libraries.
  • 8. Image Signing? 8 necessary < signing < sufficient
  • 9. “Compliance”? Traditional Def • Externally defined, externally audited • PCI, HIPAA, etc General compliance: your org’s requirements • Driven by your ops and environment requirements • Best-practices audits and enforcement Define your criteria and enforce/monitor them • How image is constructed & final output image • Block usage or just notify? Your choice • Integrate where it makes sense for your workflow • No registry or platform requirements 9
  • 10. Open-Source Analysis and Policy for container images • Policy-Driven • Deep inspection of container image • General framework, not just security • Only depends on Docker • github.com/anchore/anchore Open-Source and Extensible • Easily add your own scripts to any stage • Similar to SystemV Init Scripts: drop code in the right place and it just works Ecosystem monitoring and alerting • Navigate and keep track of the image ecosystem: online Navigator for UI and notification of public images Anchore Overview 10
  • 11. Anchore Overview 11 Anchore Navigator: http://anchore.io Anchore CLI Tools: ● pip install anchore ● docker run anchore/cli Jenkins Plugin Image Discovery Notifications Monitor dependent images Local analysis, policy, gates Build local db Local policy enforcement and definition Public Registries
  • 12. Why does Open-Source Matter for Security? 1 2 Trust, but verify
  • 13. Gates: Analysis + Policy • Use analysis output and gate modules to define and detect trigger conditions • Evaluate trigger conditions against user policy to emit actions (GO|WARN|STOP) Queries: Examine analysis data directly at any time • Query modules run against the analysis db only • Diffs, multi-image queries, statistics, etc Anchore Engine Flow 13 Analysis: Extract Image Metadata and Data • Examine the image itself and extract data like files, pkgs, etc • Includes Dockerfile analysis • No actions
  • 16. INTEGRATED INTO BUILD PIPELINES 16