Container Security — From Image Analysis to Network Segmentation, Options Are Maturing


Published: 28 August 2018 ID: G00366118

Analyst(s): |

Not a Gartner Client?

Want more research like this?
Learn the benefits of becoming a Gartner client.

contact us online

Summary

Containers and microservices architectures require DevSecOps, a protection strategy different from traditional VMs with monolithic applications. Technical professionals tasked with securing containers must harden the CI/CD pipeline so that everything that ran through it can be considered secure.

Table of Contents

  • Analysis
    • CI/CD Pipeline Threat Vectors
      • Threat Vector 1: Development System
      • Threat Vector 2: Git-Based Repository
      • Threat Vector 3: Retrieval of Dependencies
      • Threat Vector 4: Image Registry
      • Threat Vector 5: Unsecured Orchestrator Platform
      • Threat Vector 6: Host-Container Relationship
      • Threat Vector 7: Rapid Rate of Change
      • Threat Vector 8: MSA Communication and Network Segregation
      • Threat Vector 9: Interprocess Communication (IPC)
      • Threat Vector 10: Increased Number of Databases
      • Threat Vector 11: Application Layer Attacks
    • How to Mitigate the Threat Vectors
    • Foundational Controls
      • Host Hardening
      • Mandatory Access Controls
      • Secure Computing Mode Profiles
      • Secrets Management
    • Basic Controls
      • Software Composition Analysis
      • Authorization Between Microservices and MSA Resilience
      • API Gateways
    • Risk-Based Controls
      • Data-Centric Controls: DAP and FCAP
      • Vulnerability Assessment
      • Behavior-Based Controls
      • Network Segmentation for Containers
    • Architectural Considerations
    • Strengths
    • Weaknesses
  • Guidance
    • Make Security Pervasive in the CD/CD Pipeline
    • Use Secrets Management and Software Composition Analysis as Your Primary Container Protection Strategies
    • Add Layer 7 Network Segmentation for Operational Containers That Require Defense in Depth
    • Require Vendors to Integrate With the Container Offerings of Leading Cloud Service Providers
  • The Details
    • Representative Generalized Container Security Products
    • Representative Container Network Security Products
    • Open-Source Projects to Secure Containers
  • Gartner Recommended Reading
© 2018 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartners research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

Free Research

Discover what 12,000 CIOs and Senior IT leaders already know.

Free Access

Why Gartner

Gartner delivers the technology-related insight you need to make the right decisions, every day.

Find out more

Call +1 855-515-4486 or contact us

to become a Gartner client.