Continuous Security Assessment for the Docker Ecosystem
Cavirin is taking a leadership role securing the container lifecycle, including OS hardening of containers as well as registry and Docker Hub image scanning.
Securing the Container Lifecycle from the Beginning
Scanning the container images for security is critical before they hit production, since container based applications are often built by composing with other images downloaded from registries, some even untrusted, that can potentially have serious vulnerabilities. We have automated container security to the level of easy integration into application development process and CI/CD pipeline.
If they are implementing containers either on-premise or as part of a cloud deployment, you need to ensure that their workloads are secure. And, if you bring in images from a registry, you need to ensure that these are not corrupted. We support both of these scenarios, de-risking their deployments.
Cavirin's automated image scanning looks at and assess all things within the actual Docker image, including security baselines and whether the system is patched, and can play an important role in the CI/CD pipeline. This is critical, since about a third of all container images found in public or even private registries have vulnerabilities.
OS hardening of the full containerized infrastructure stack removes security holes and unnecessary/corrupt images to provide unsurpassed security in addition to improving container performance.
Come See Us at This Year's DockerCon17
- Cavirin Announces Continuous Security Assessment for Docker (Cavirin Blog)
- DockerCon 2017 Q&A: Cavirin Will Demostrate Leadership Role of Securing the Container Lifecycle (VMblog.com)
- CIS Docker 1.13 Benchmark is Now Available (Cavirin Blog)
- Docker Container Security And STRIDE (Cavirin Blog)
- Docker Security a Product Manager's View (Cavirin Blog)
Meet Pravin Goyle, Director of Information Security and Compliance Engineering at Cavirin
Check out his video, CIS Benchmarking 101