SlideShare a Scribd company logo
https://bit.ly/supply_chain_security_for_containers
chukmunnlee@nus.edu.sg
Supply Chain
Security for
Containerised
Workloads
https://bit.ly/supply_chain_security_for_containers
Objective
Introduce a set of tools for working with containers
(Integratable into your CI)
https://bit.ly/supply_chain_security_for_containers
Trend - Kubernetes Adoption
https://www.cncf.io/wp-content/uploads/2022/02/CNCF-AR_FINAL-edits-15.2.21.pdf
https://bit.ly/supply_chain_security_for_containers
Why are Containers Gaining Popularity?
Development Distribution Deployment
https://bit.ly/supply_chain_security_for_containers
Difference Between Virtual Machines and Containers
Hardware
Hypervisor
Applicat
ion
OS
Applicat
ion
OS
Applicat
ion
OS
Hardware
Linux
Applicat
ion
Applicat
ion
Applicat
ion
Virtual machine
virtualizes the hardware
Network namespace
virtualizes Linux
https://bit.ly/supply_chain_security_for_containers
What is in a Container?
Configurations Runtime
Code
Environment Dependencies
https://bit.ly/supply_chain_security_for_containers
What is Docker (and other container tools)?
A set of tools and engine for
- Packaging applications into a standard format, referred to as an ‘image’
- Deploying images as containers into Linux namespaces
- Manages the containers, networking, volumes, resources, etc
Used the following core Linux technologies
- Network namespace
- CGroups
- Union filesystem
A write once deploy anywhere
- Anywhere that Docker is installed or on anywhere with OCI compliant runtime installed
https://bit.ly/supply_chain_security_for_containers
Dockerfile FROM node:20
WORKDIR /app
COPY config.json
COPY main.js .
COPY public .
COPY package.json .
RUN npm ci
ENV PORT=3000
EXPOSE ${PORT}
ENTRYPOINT node main
Runtime
Environment
Dependencies
Code
Configurations
BUILD
RUN
https://bit.ly/supply_chain_security_for_containers
Docker Workflow
Base image
Dockerfile Your application’s
image
Containers
Container registry
Run
Build
Push
Developer Run
Pull
Dependencies
Application and
artifacts
https://bit.ly/supply_chain_security_for_containers
Software Supply Chain Security
Modern cloud native application relies and uses
- Platform
- Code generators
- Libraries and dependencies
Attackers insert malicious code into platform, compilers and code generators,
libraries, etc
- Use these as the attack vector rather than attacking your application directly
Containerised applications supply chain
- Libraries and dependencies
- Pulling unverified images or from dubious image registries
- Badly written Dockerfile
https://bit.ly/supply_chain_security_for_containers
https://www.redhat.com/en/resources/kubernetes-adoption-security-market-trends-overview
Your software
supply chain
https://bit.ly/supply_chain_security_for_containers
Security Challenges
Base image
Dockerfile
Containers
Container registry
Run
Build
Push
Developer Run
Pull
Badly written
Unverified base image
Dependencies
Application and
artifacts
Pulling a
compromised image
Malicious code
in containers
Your application’s
image
https://bit.ly/supply_chain_security_for_containers
Container Image Integrity
Scan code base,
dependences,
configurations for
exposed secrets
https://bit.ly/supply_chain_security_for_containers
Scanning Image and Filesystem
trivy - tool to scan vulnerabilities in filesystem, repository, image
- Scan secrets, config, vulnerability for CVE listings
- Produces report in JSON, table, SARIF
- Generate SBOM (later)
trivy filesystem --format=json --output=scan.json 
--severity=HIGH,CRITICAL <src path>
trivy image --scanners=vuln --exit-code=1 
-s HIGH,CRITICAL node:20
trivy filesystem -s CRITICAL --secret-config policy.yaml .
Scan report format
Severity Exit code, eg. using
in CI pipeline
Only scan for
vulnerabilities
Custom rules
https://bit.ly/supply_chain_security_for_containers
Infrastructure as Code
Servers Networking
Storage and
databases
Monitoring Security
Iac Script
Virtualized infrastructure
Provision
● Process of provisioning and
managing IT resources through
machine readable files
● Scripts describe the required setup,
configurations and dependencies
between resources
● IaC tools provision the resources
PaaS
https://bit.ly/supply_chain_security_for_containers
Container Image Integrity
Analysis
Policy
Ensure that code
and IaC conforms
to best practices
Scan code base,
dependences,
configurations for
exposed secrets
Image
Build
https://bit.ly/supply_chain_security_for_containers
Docker Image Tag
Tagging image
- Never - no tag when building image, default to :latest
- Good - give meaningful names to tags, eg v1.0.0
- Better - use the tag to associate the image to a commit eg a release branch
- git rev-parse --short HEAD
Using image
- Never - use the :latest tag
- Good - use a tag
- Best - use the image digest instead of tag
- The image’s hash
- docker image -f ‘{{.RepoDigests}}’ <image>
https://bit.ly/supply_chain_security_for_containers
About Image Tags
docker build -t fred/myapp:v1 .
docker build -t fred/myapp:v1 .
Overwritten the previous image
with the same tag
FROM fred/myapp:v1
Might be using the incorrect image
sha256:b24cde…
sha256:3fbc6…
Each image produce a
different hash after pushing to
container registry
FROM fred/myapp@sha256:3fbc6…
No ambiguity
https://bit.ly/supply_chain_security_for_containers
Enforce Policy
conftest - evaluate Dockerfile against as set of rules
- https://www.conftest.dev/
- Scan results can be output as JUnit, Github
Rules are written with Rego, a Prolog like language
- https://www.openpolicyagent.org/docs/latest/#rego
- Free course available - https://academy.styra.com/courses/opa-rego
Open Policy Agent is general purpose tool to enforce policy
- https://www.openpolicyagent.org/docs/latest/
- Decouple policies from application
conftest test Dockerfile --output github --policy policy
https://bit.ly/supply_chain_security_for_containers
Example of Policy File
deny[msg] {
input[i].Cmd = “from”
val = input[i].Value
contains(val[_], “:latest”)
msg = sprintf(“Cannot use :latest tag %s”, val)
}
deny[msg] {
input[i].Cmd = “from”
val = input[i].Value
count(split(val, “:”)) < 2
msg = sprintf(“Please add an image tag to %s”, val)
}
More examples https://www.conftest.dev/examples
Policy
Prevent pulling images
with the ‘latest’ tag
https://bit.ly/supply_chain_security_for_containers
Container Image Integrity
Sign
Analysis
Image
Policy
Build
Image’s signature
Verify
Ensure that code
and IaC conforms
to best practices
Validate that the
image has not
been tempered
Scan code base,
dependences,
configurations for
exposed secrets
https://bit.ly/supply_chain_security_for_containers
Signing Images
cosign is tool for signing and verify container images and artifacts
- Generate public/private key pair for signing
- Signing and verify image signature
- Attaching and signing container artifacts like SBOM
Generate a key pair
- Produces cosign.key and cosign.pub
cosign generate-key-pair
https://bit.ly/supply_chain_security_for_containers
Signing and Verifying Images
cosign sign --key=path/to/cosign.key myimage@sha256:12345…
cosign verify --key=path/to/cosign.pub myimage@sha256:12345…
Use the image digest when you sign the
image. Then the signature is related to an
immutable image reference
Verify the image using the image digest
https://bit.ly/supply_chain_security_for_containers
Signing Image
cosign rekor
Record in
Sign
Produce
https://bit.ly/supply_chain_security_for_containers
Validating Image - 2
cosign triangulate myimage@sha256:12345…
crane manifest <cosign signature>
rekor-cli get --log-index <index>
Extract co-located cosign
signature from image
Get the signature’s manifest
Get the entry from Rekor
https://bit.ly/supply_chain_security_for_containers
Software Bill of Materials
List of inventories and dependencies that make up an
application
- Identifies the software components within larger pieces of
software and the licenses associated with their components
- In the context of containers, these will be the contents of the
image, its dependencies, licenses, etc
Purpose
- Track updates and known security vulnerabilities for each
component in the software project’s dependencies
- Auditing purposes as it ensures that only authorized
dependencies are included in a software project
Standards
- SPDX (Software Packet Data Exchange) - https://spdx.dev/
- CycloneDX - https://cyclonedx.org/
Image from https://spdx.github.io/spdx-spec/v2.2.2/composition-of-an-SPDX-document/
https://bit.ly/supply_chain_security_for_containers
Container Image Integrity
Sign
Analysis
Image SBOM
Policy
Build Produce
Sign
Image’s signature Attestation
Verify Verify
Ensure that code
and IaC conforms
to best practices
Validate that the
image has not
been tempered
Tracks dependencies
for security, licensing,
etc
Confirmation of
the provenance of
the image
Scan code base,
dependences,
configurations for
exposed secrets
https://bit.ly/supply_chain_security_for_containers
Image SBOM and Attestation
trivy image --format=spdx --output=sbom.spdx 
myimage@sha256:12345…
cosign attach sbom --type=spdx --sbom=sbom.spdx 
myimage@sha256:12345…
cosign attest --key=path/to/cosign.key 
--type=spdx --predicate=sbom.spdx 
myimage@sha256:12345…
cosign verify-attestation --key=path/to/cosign.pub 
--type=spdx myimage@sha256:12345…
Generate SBOM
in SPDX format
Attach SBOM to
the image
Create an attestation
by signing the SBOM
Verify the attestation
https://bit.ly/supply_chain_security_for_containers
Scan SBOM
cosign download sbom --output-file sbom.spdx 
myimage@sha256:12345…
trivy sbom --severity HIGH,CRITICAL sbom.spdx
Download SBOM for
the given image
Scan the SBOM for
vulnerabilities
https://bit.ly/supply_chain_security_for_containers
Tools
Sign
Analysis
Image SBOM
Policy
Build Produce
Sign
Image’s signature Attestation
Verify Verify
trivy
Scan for
vulnerabilities
in code
conftest
Enforce best
practices
cosign
Sign and verify
image and BOM
https://bit.ly/supply_chain_security_for_containers
My Medium Article - CI/CD Pipeline
Argo Workflow — A Pipeline to Build and Deploy Containers
https://bit.ly/supply_chain_security_for_containers

More Related Content

PPTX
Open source security tools for Kubernetes.
Michael Ducy
 
PDF
Pragmatic Pipeline Security
James Wickett
 
PDF
What is the Secure Supply Chain and the Current State of the PHP Ecosystem
sparkfabrik
 
PPTX
OpenChain Webinar #50 - An Overview of SPDX 3.0
Shane Coughlan
 
PDF
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
ICS
 
PDF
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
sparkfabrik
 
PDF
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...
apidays
 
PDF
Continuous Security: From tins to containers - now what!
Michael Man
 
Open source security tools for Kubernetes.
Michael Ducy
 
Pragmatic Pipeline Security
James Wickett
 
What is the Secure Supply Chain and the Current State of the PHP Ecosystem
sparkfabrik
 
OpenChain Webinar #50 - An Overview of SPDX 3.0
Shane Coughlan
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
ICS
 
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
sparkfabrik
 
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...
apidays
 
Continuous Security: From tins to containers - now what!
Michael Man
 

Similar to Supply Chain Security for Containerised Workloads - Lee Chuk Munn (20)

PPTX
Top10 Characteristics of Awesome Apps
Casey Lee
 
PPTX
Securing the Infrastructure and the Workloads of Linux Containers
Massimiliano Mattetti
 
PDF
IRJET- Sandbox Technology
IRJET Journal
 
PPT
2011 NASA Open Source Summit - Forge.mil
NASA Open Government Initiative
 
PDF
PARKING ALLOTMENT SYSTEM PROJECT REPORT REPORT.
Kamal Acharya
 
PDF
SLTS kernel and base-layer development in the Civil Infrastructure Platform
Yoshitake Kobayashi
 
PDF
BUILDING A CONTINUOUSLY INTEGRATING SYSTEM WITH HIGH SAFETY
IJNSA Journal
 
PDF
Slide Griffin - Practical Attacks and Mitigations
EnergySec
 
PDF
Cloud-native Java EE-volution
QAware GmbH
 
PPT
Agentless System Crawler - InterConnect 2016
Canturk Isci
 
PPTX
Just-in-time Detection of Protection-Impacting Changes on WordPress and Media...
Amine Barrak
 
PDF
The Reconstitution of Middleware with APIs
Asanka Abeysinghe
 
PDF
IRJET- Blockchain based Secure Data Storage
IRJET Journal
 
PDF
vinay-mittal-new
Vinay Mittal
 
PDF
How to Secure Your Kubernetes Software Supply Chain at Scale
Anchore
 
PPTX
KubeClarity - CNCF Webinar.pptx
LibbySchulze
 
PPTX
Transforming your Security Products at the Endpoint
Ivanti
 
PPTX
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
 
PDF
Spring and Pivotal Application Service - SpringOne Tour Dallas
VMware Tanzu
 
PDF
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
sparkfabrik
 
Top10 Characteristics of Awesome Apps
Casey Lee
 
Securing the Infrastructure and the Workloads of Linux Containers
Massimiliano Mattetti
 
IRJET- Sandbox Technology
IRJET Journal
 
2011 NASA Open Source Summit - Forge.mil
NASA Open Government Initiative
 
PARKING ALLOTMENT SYSTEM PROJECT REPORT REPORT.
Kamal Acharya
 
SLTS kernel and base-layer development in the Civil Infrastructure Platform
Yoshitake Kobayashi
 
BUILDING A CONTINUOUSLY INTEGRATING SYSTEM WITH HIGH SAFETY
IJNSA Journal
 
Slide Griffin - Practical Attacks and Mitigations
EnergySec
 
Cloud-native Java EE-volution
QAware GmbH
 
Agentless System Crawler - InterConnect 2016
Canturk Isci
 
Just-in-time Detection of Protection-Impacting Changes on WordPress and Media...
Amine Barrak
 
The Reconstitution of Middleware with APIs
Asanka Abeysinghe
 
IRJET- Blockchain based Secure Data Storage
IRJET Journal
 
vinay-mittal-new
Vinay Mittal
 
How to Secure Your Kubernetes Software Supply Chain at Scale
Anchore
 
KubeClarity - CNCF Webinar.pptx
LibbySchulze
 
Transforming your Security Products at the Endpoint
Ivanti
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
 
Spring and Pivotal Application Service - SpringOne Tour Dallas
VMware Tanzu
 
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
sparkfabrik
 
Ad

More from NUS-ISS (20)

PDF
Designing Impactful Services and User Experience - Lim Wee Khee
NUS-ISS
 
PDF
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS
 
PDF
The Importance of Cybersecurity for Digital Transformation
NUS-ISS
 
PDF
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
NUS-ISS
 
PDF
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS
 
PDF
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
NUS-ISS
 
PDF
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
NUS-ISS
 
PDF
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
NUS-ISS
 
PDF
Future of Learning - Yap Aye Wee.pdf
NUS-ISS
 
PDF
Future of Learning - Khoong Chan Meng
NUS-ISS
 
PPTX
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
NUS-ISS
 
PDF
Product Management in The Trenches for a Cloud Service
NUS-ISS
 
PDF
Overview of Data and Analytics Essentials and Foundations
NUS-ISS
 
PDF
Predictive Analytics
NUS-ISS
 
PDF
Feature Engineering for IoT
NUS-ISS
 
PDF
Master of Technology in Software Engineering
NUS-ISS
 
PDF
Master of Technology in Enterprise Business Analytics
NUS-ISS
 
PDF
Diagnosing Complex Problems Using System Archetypes
NUS-ISS
 
PPTX
Satisfying the ‘-ilities’ of an Enterprise Cloud Service
NUS-ISS
 
PDF
Preparing and Acing your Kubernetes Certification
NUS-ISS
 
Designing Impactful Services and User Experience - Lim Wee Khee
NUS-ISS
 
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS
 
The Importance of Cybersecurity for Digital Transformation
NUS-ISS
 
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
NUS-ISS
 
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS
 
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
NUS-ISS
 
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
NUS-ISS
 
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
NUS-ISS
 
Future of Learning - Yap Aye Wee.pdf
NUS-ISS
 
Future of Learning - Khoong Chan Meng
NUS-ISS
 
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
NUS-ISS
 
Product Management in The Trenches for a Cloud Service
NUS-ISS
 
Overview of Data and Analytics Essentials and Foundations
NUS-ISS
 
Predictive Analytics
NUS-ISS
 
Feature Engineering for IoT
NUS-ISS
 
Master of Technology in Software Engineering
NUS-ISS
 
Master of Technology in Enterprise Business Analytics
NUS-ISS
 
Diagnosing Complex Problems Using System Archetypes
NUS-ISS
 
Satisfying the ‘-ilities’ of an Enterprise Cloud Service
NUS-ISS
 
Preparing and Acing your Kubernetes Certification
NUS-ISS
 
Ad

Recently uploaded (20)

PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
The Future of Artificial Intelligence (AI)
Mukul
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 

Supply Chain Security for Containerised Workloads - Lee Chuk Munn