With containers, complex applications can be deployed on a single host utilizing many different micro-services host in containers on that host. With this advantage that containers give, it is important to protect their integrity. This includes everything from the applications they hold, to the infrastructure they rely on.
In our container security service, we include everything from the applications they hold to the infrastructure they rely on. Container security needs to be integrated and continuous.
Our Approach
Reconnaissance
Security Assessment
Risk Analysis
Reporting & Remediation Support
Re-validation
Reconnaissance
Banner grabbing, fingerprinting & service discovery
Security Assessment
Scanning the image to identify know vulnerabilities.
Configuration review to identify mis configurations
Penetration Testing to safely simulate attak scenario with agreed rules of engagement.
Risk Analysis
Calcuate the risk of identified issues based on factors such as criticality of asset, business impact, compromise of Confidentiality, Integrity & Availablilty.
Reporting & Remediation Support
Identified Security Vulnerabilities are documented with detailed steps to reproduce with recommendations or mitigation measures.
Re-validation
Post remediation, re-validation is performed to validate the patch and closure of vulnerabilities.
While giving optimal container security, we focus on the following:
Container Security Architecture
The security of the container host
Container network traffic
The security of your application within the container
Malicious behavior within your application
Securing your container management stack
The foundation layers of your application
Tensecure scans container images based on a constantly updated stream of aggregate sources of vulnerability data (CVEs, vendor advisories, and proprietary research), which ensures up-to-date, broad coverage while minimizing false positives. Additionally, find malware, embedded secrets, OSS licenses, and configuration issues in your images to further reduce the attack surface.
Discover sophisticated malware hidden in open source packages & 3rd party images, preventing attacks on your container-based applications, including credential theft, cryptocurrency mining, data exfiltration.
Aqua DTA dynamically analyzes images before they in a secure isolated sandboxed environment, examining and tracing behavioral anomalies to uncover advanced malware that cannot be detected by static scanners.