Posts

Showing posts from December, 2020

Container Security - GAVS Technologies

Image
Containers are different from Virtual Machines, where VMs need a guest operating system, running on a host operating system, where CPU, Memory, and disk are virtualized. Here, software and its dependencies are packaged.  Containers Image Vulnerabilities Here, an image may be patched without known vulnerabilities initially. But later, a vulnerability might have been discovered while the container image is no longer patched. In traditional systems, updates should be upstreamed in the images, and then deployed again, therefore, containers have vulnerabilities because of the older image version which is deployed. Countermeasures - To get actionable and reliable results we need to use tools that have been designed to assess containers and to avoid container image misconfiguration, you need to validate the image configuration before deploying. Embedded Malware and Clear Text Secrets Container images are collections of files packaged together, having chances of malicious files getting added u