On Security Measures for Containerized Applications Imaged with Docker

08/11/2020
by   Samuel P. Mullinix, et al.
0

Linux containers have risen in popularity in the last few years, making their way to commercial IT service offerings (such as PaaS), application deployments, and Continuous Delivery/Integration pipelines within various development teams. Along with the wide adoption of Docker, security vulnerabilities and concerns have also surfaced. In this survey, we examine the state of security for the most popular container system at the moment: Docker. We will also look into its origins stemming from the Linux technologies built into the OS itself; examine intrinsic vulnerabilities, such as the Docker Image implementation; and provide an analysis of current tools and modern methodologies used in the field to evaluate and enhance its security. For each section, we pinpoint metrics of interest, as they have been revealed by researchers and experts in the domain and summarize their findings to paint a holistic picture of the efforts behind those findings. Lastly, we look at tools utilized in the industry to streamline Docker security scanning and analytics which provide built-in aggregation of key metrics.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/07/2020

Vulnerabilities Mapping based on OWASP-SANS: a Survey for Static Application Security Testing (SAST)

The delivery of a framework in place for secure application development ...
research
01/11/2021

Understanding the Quality of Container Security Vulnerability Detection Tools

Virtualization enables information and communications technology industr...
research
10/28/2014

A First Look at Firefox OS Security

With Firefox OS, Mozilla is making a serious push for an HTML5-based mob...
research
05/25/2021

Securing Serverless Computing: Challenges, Solutions, and Opportunities

Serverless computing is a new cloud service model that reduces both clou...
research
09/07/2022

State of Security Awareness in the AM Industry: 2020 Survey

Security of Additive Manufacturing (AM) gets increased attention due to ...
research
03/31/2018

A Survey of Techniques for Improving Security of GPUs

Graphics processing unit (GPU), although a powerful performance-booster,...

Please sign up or login with your details

Forgot password? Click here to reset