Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Docker Boosts Security for Containerized Applications

Docker, makers of container technology that enables speedy deployment of applications, has unveiled new security enhancements to extend the protection of “Dockerized” distributed applications.

Docker, makers of container technology that enables speedy deployment of applications, has unveiled new security enhancements to extend the protection of “Dockerized” distributed applications.

Docker is an open platform that allows developers and system administrators to build and run distributed applications that run the same, regardless of the environment they are running in.

Similar to virtual machines, containers benefit from resource isolation and allocation, but do not rely on an OS kernel, making them faster and more portable than virtual machines.

Included in the latest security protections unveiled by Docker are hardware signing of container images, content auditing through image scanning and vulnerability detection and granular access control policies with user namespaces.

Hardware signing and scanning of container images directly address the trust and integrity of application content, Docker said, as the new features verify the publisher of the content. Furthermore, the chain of trust is protected and containerized content is verified via image scanning.

“It has been our goal from the beginning to develop a framework that secures Dockerized distributed applications throughout the entire application lifecycle,“ said Solomon Hykes, CTO and Chief Architect of Docker. “With this latest set of capabilities, we continue to drive our users and ecosystem forward with industry-first innovations and best practices that advance the end-to-end security of distributed applications. Furthermore, we’ve enabled developers and IT ops to benefit from a more secure environment, without having to learn a new set of commands or to be trained on a deep set of security principles. Docker security works as part of an integrated component without any disruption to developer productivity while providing IT with the appropriate level of security controls.”

The new security enhancement builds on Docker Content Trust, a framework that allows verification of the image publisher. Prior to Docker Content Trust, IT operations had no way to validate content, the company said. Docker Content Trust verifies the publisher and ensures the integrity of the content.

Docker Content Trust’s hardware signing is done under a partnership with Yubico to roll out a “touch-to-sign” code signing system that leverages YubiKeys (hardware key), which enable secure software creation for Docker developers, sysadmin and third-party ISVs. With the YubiKey 4, Docker users can digitally sign code during initial development and through subsequent updates to ensure the integrity of the Dockerized application throughout the application pipeline, Docker said.

Advertisement. Scroll to continue reading.

“This is an important milestone for Yubico and our community as we move beyond authentication to address another area in which the YubiKey shines, using our hardware to perform cryptographic sign operations,” said Jerrod Chong, VP, Solutions Engineering, Yubico. “Having root keys stored in the secure element of the YubiKey means attackers cannot duplicate the keys and forge sign operations; insecure storage of keys in software modules is often the root cause for many of the vulnerabilities found in software packages.”

YubiKey 4 works on Microsoft Windows, Mac OS X, Linux operating systems and major Web browsers.

Docker also announced a new secure service for its Official Repos that provides direct visibility into the content security of ISV software that is part of this set of images.

Docker image scanning and vulnerability detection provides container-optimized capability for granular auditing of images, presenting the results to ISVs and sharing the final output for Docker users to make decisions on which content to use based on their security policies.

If the scanning service detects an issue, ISVs can fix vulnerabilities and upgrade the security profile of their content. Because Official Repos is also integrated with Docker Content Trust, users are able to establish the validity of the publisher as well as the integrity of the image content. The end result is that IT organizations can rely on Official Repos as a curated source for secure, high-integrity content.

“This new capability addresses IT operations concerns about getting information regarding what’s inside the container,” Docker explained. “Users for the first time are presented with automated insights that give them the instant visibility they need to determine if they want to use that image or not.”

Introduced as part of the 1.9 Experimental release, user namespaces gives users the ability to separate container and Docker daemon-level privileges to assign privileges for each container by user group. With the new levels of control, containers themselves don’t have access to root on the host – only the Docker daemon does. The new functionality also gives IT teams the ability lock down hosts to a restricted group of sysadmins.

Docker says its technology is used by millions of developers across thousands of organizations, including eBay, Baidu, the BBC, Goldman Sachs, Groupon, ING, Yelp, and Spotify.

While container adoption is likely to surge over the next few years, concerns around security, certification and adequate skills remain, according to the results of a survey released earlier this year by Red Hat. 

RelatedDisrupting the Disruptor: Security of Docker Containers

Related: IT Teams Question Security of App Containers: Survey

RelatedMicrosoft Launches Azure Container Service Preview

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.