SlideShare a Scribd company logo
Securing Containers by Breaking In
@liran_tal
Snyk
DevSecCon Tel Aviv 2019
Node.js Security WG
Liran Tal
OWASP NodeGoat
author of
- Essential Node.js Security
- O’Reilly’s Serverless Security
Developer Advocate
@liran_tal
@liran_tal
1 billion weekly d/l
of container images
@liran_tal
Best Practices
for Docker Image Security
@liran_tal
#1 Prefer Minimal Base Images
@liran_tal
source: https://snyk.io/opensourcesecurity-2019
@liran_tal
source: https://snyk.io/opensourcesecurity-2019
@liran_tal
source: https://snyk.io/opensourcesecurity-2019
@liran_tal
#2 Least Privileged User
@liran_tal
@liran_tal
@liran_tal
#3 Enable 2FA
@liran_tal
how precious are your
container images?
@liran_tal
State of 2FA in the npm registry
@liran_tal
6.89%
of all developers
State of 2FA in the npm registry
@liran_tal
6%
of all packages
State of 2FA in the npm registry
@liran_tal
State of 2FA in ecosystem
@liran_tal
0%
of all users
State of 2FA in ecosystem
@liran_tal
State of 2FA in ecosystem
@liran_tal
State of 2FA in ecosystem
@liran_tal
State of 2FA in ecosystem
@liran_tal
State of 2FA in ecosystem
@liran_tal
State of 2FA in ecosystem
@liran_tal
State of 2FA in ecosystem
@liran_tal
#4 Sign and verify images
@liran_tal
@liran_tal
@liran_tal
@liran_tal
#5 Find, Fix and Monitor
Open Source Vulnerabilities in the OS
@liran_tal
76.6%
of the top 1,000 Docker containers
have severe known vulnerabilities
@liran_tal
source: https://snyk.io/opensourcesecurity-2019
@liran_tal
source: https://snyk.io/opensourcesecurity-2019
@liran_tal
source: https://snyk.io/opensourcesecurity-2019
@liran_tal
@liran_tal
@liran_tal
@liran_tal
44%
of docker image vulnerabilities can
be fixed with newer base images
@liran_tal
source: https://snyk.io/opensourcesecurity-2019
@liran_tal
20%
of docker image vulnerabilities can
be fixed just by rebuilding them
@liran_tal
source: https://snyk.io/opensourcesecurity-2019
@liran_tal
@liran_tal
What can possibly go wrong
with vulnerabilities in my container?
@liran_tal
@liran_tal
@liran_tal
@liran_tal
@liran_tal
What can possibly go wrong
with vulnerabilities in my container?
@liran_tal
@liran_tal
#6 Use a linter
@liran_tal
@liran_tal
#7 application dependencies impact
container security too
@liran_tal
Your App
@liran_tal
Your App
Your Code
@liran_tal
source: https://snyk.io/opensourcesecurity-2019
@liran_tal
source: https://snyk.io/opensourcesecurity-2019
@liran_tal
What can possibly go wrong
with vulnerabilities in my app?
@liran_tal
#8 Multi-stage builds
@liran_tal
build image
compile and setup your app
prod image
production artifacts
@liran_tal
Attackers are targeting open source
one vulnerability = many victims
@liran_tal
Re-build images often
Choose the right base image
Scan docker images during devel’
Use a security linter for a Dockerfile
Use multi-stage docker builds
https://snyk.io/blog/10-docker-image-security-best-practices
Enable 2FA and use trusted images
Be a Responsible Cool Kid
Containers are Cool
@liran_tal

More Related Content

PDF
OWASP Workshop: Docker Image Security Best Practices by Liran Tal - January 2020
PDF
Stranger Danger - Finding vulnerabilities before they find you - Liran Tal 2021
PDF
Discovering and Fixing Dependency Vulnerabilities for Kubernetes apps with Sn...
PPTX
Continous Delivery and Continous Integration at IKERLAN
PPTX
Concurrent version management(tortoise CVS)
PPTX
Protecting Applications with Lambda@Edge and OAuth
PDF
Hands on React Native: From Zero to Hero
PDF
TDD and the Terminator: An Introduction to Test-Driven Development
OWASP Workshop: Docker Image Security Best Practices by Liran Tal - January 2020
Stranger Danger - Finding vulnerabilities before they find you - Liran Tal 2021
Discovering and Fixing Dependency Vulnerabilities for Kubernetes apps with Sn...
Continous Delivery and Continous Integration at IKERLAN
Concurrent version management(tortoise CVS)
Protecting Applications with Lambda@Edge and OAuth
Hands on React Native: From Zero to Hero
TDD and the Terminator: An Introduction to Test-Driven Development

What's hot (19)

PDF
New Farming Methods in the Epistemological Wasteland of Application Security
PDF
How Components Increase Speed and Risk
PDF
SplunkLive Melbourne Splunk for Developers
PDF
SplunkLive Brisbane Splunk for Developers
PDF
Taking the Ks off your APKs - Rotem Mizrachi-Meidan, Everything.me
PDF
Continuous Integration on my work
PPTX
Perforce Helix Git Swarm: Enterprise Git Ecosystem
PDF
30+ Nexus Integrations to Accelerate DevOps
PPTX
Drozer - An Android Application Security Tool
PDF
NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)
PDF
Principles of Monitoring Microservices
PPTX
Android pentesting
PDF
Android pentesting
PDF
The DevSecOps Builder’s Guide to the CI/CD Pipeline
PDF
What's hot docker con eu 2015 & what's new on docker 1.9
PDF
Cutting-Edge Continuous Delivery: Automated Canary Analysis Through Spring-Ba...
PDF
Preventing Supply Chain Attacks on Open Source Software
PDF
Git in the Enterprise: How to succeed at DevOps using Git and a monorepo
PPT
Eclipse Hacker's Guide to the Git Universe
New Farming Methods in the Epistemological Wasteland of Application Security
How Components Increase Speed and Risk
SplunkLive Melbourne Splunk for Developers
SplunkLive Brisbane Splunk for Developers
Taking the Ks off your APKs - Rotem Mizrachi-Meidan, Everything.me
Continuous Integration on my work
Perforce Helix Git Swarm: Enterprise Git Ecosystem
30+ Nexus Integrations to Accelerate DevOps
Drozer - An Android Application Security Tool
NYIT DSC/ Spring 2021 - Introduction to DevOps (CI/CD)
Principles of Monitoring Microservices
Android pentesting
Android pentesting
The DevSecOps Builder’s Guide to the CI/CD Pipeline
What's hot docker con eu 2015 & what's new on docker 1.9
Cutting-Edge Continuous Delivery: Automated Canary Analysis Through Spring-Ba...
Preventing Supply Chain Attacks on Open Source Software
Git in the Enterprise: How to succeed at DevOps using Git and a monorepo
Eclipse Hacker's Guide to the Git Universe
Ad

Similar to Securing containers by Breaking In - Liran Tal - DevSecCon Tel Aviv 2019 (20)

PDF
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
PDF
Security Patterns for Microservice Architectures - SpringOne 2020
PDF
Security Patterns for Microservice Architectures
PDF
Security Patterns for Microservice Architectures - London Java Community 2020
PDF
Security Patterns for Microservice Architectures - Oktane20
PDF
Hacking into your containers, and how to stop it!
PPTX
Workshop: Hands-On Container Image Security Mastering Sigstore for Unbreachab...
PDF
BSides SF talk on Docker Images Security - Feb 13, 2017
PDF
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
 
PDF
KubeHuddle NA 2023 - Why should devs care about container security - Eric Sma...
PDF
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
PDF
DevSecCon Lightning 2021- Container defaults are a hackers best friend
PDF
GDG SLK - Why should devs care about container security.pdf
PDF
Why Should Developers Care About Container Security?
PDF
ATO 2022 - Why should devs care about container security.pdf
PDF
Container Stranger Danger - Why should devs care about container security
PDF
Python Web Conference 2022 - Why should devs care about container security.pdf
PDF
OSDC 2016 - Inspecting Security of Docker formatted Container Images to find ...
PDF
From Zero to Hero: Continuous Container Security in 4 Simple Steps
PDF
Breaking and fixing_your_dockerized_environments_owasp_appsec_usa2016
Security Patterns for Microservice Architectures - ADTMag Microservices & API...
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures
Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - Oktane20
Hacking into your containers, and how to stop it!
Workshop: Hands-On Container Image Security Mastering Sigstore for Unbreachab...
BSides SF talk on Docker Images Security - Feb 13, 2017
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
 
KubeHuddle NA 2023 - Why should devs care about container security - Eric Sma...
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
DevSecCon Lightning 2021- Container defaults are a hackers best friend
GDG SLK - Why should devs care about container security.pdf
Why Should Developers Care About Container Security?
ATO 2022 - Why should devs care about container security.pdf
Container Stranger Danger - Why should devs care about container security
Python Web Conference 2022 - Why should devs care about container security.pdf
OSDC 2016 - Inspecting Security of Docker formatted Container Images to find ...
From Zero to Hero: Continuous Container Security in 4 Simple Steps
Breaking and fixing_your_dockerized_environments_owasp_appsec_usa2016
Ad

Recently uploaded (20)

PPTX
CHAPTER 2 - PM Management and IT Context
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
Salesforce Agentforce AI Implementation.pdf
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
medical staffing services at VALiNTRY
PDF
Autodesk AutoCAD Crack Free Download 2025
PPTX
history of c programming in notes for students .pptx
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
CHAPTER 2 - PM Management and IT Context
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Designing Intelligence for the Shop Floor.pdf
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Why Generative AI is the Future of Content, Code & Creativity?
Salesforce Agentforce AI Implementation.pdf
How to Choose the Right IT Partner for Your Business in Malaysia
Odoo Companies in India – Driving Business Transformation.pdf
Monitoring Stack: Grafana, Loki & Promtail
Internet Downloader Manager (IDM) Crack 6.42 Build 41
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Design an Analysis of Algorithms I-SECS-1021-03
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
wealthsignaloriginal-com-DS-text-... (1).pdf
Wondershare Filmora 15 Crack With Activation Key [2025
medical staffing services at VALiNTRY
Autodesk AutoCAD Crack Free Download 2025
history of c programming in notes for students .pptx
Advanced SystemCare Ultimate Crack + Portable (2025)

Securing containers by Breaking In - Liran Tal - DevSecCon Tel Aviv 2019