This is a guest post written by NeuVector's Glen Kosaka
NeuVector partners with Red Hat to ensure accurate, consistent image vulnerability and compliance scanning results from build to ship to run.
NeuVector has always integrated container security into the pipeline all the way to production, and recently has enhanced its capabilities to protect Red Hat and OpenShift based deployments. Two recent announcements demonstrate this:
- Red Hat Vulnerability Scanner certification. The new certification recognizes NeuVector as a trusted Red Hat security partner ready to deliver more consistent container vulnerability scanning for Red Hat-published images and related packages. NeuVector assisted in shaping the certification throughout its pilot phase and is ready to provide immediate vulnerability scanning support to Red Hat customers at program launch:
"As a Red Hat certified security partner, NeuVector enables enterprises to precisely assess vulnerability risks across Red Hat products and packages” - Implementation of Draft OpenShift ‘Inspired by CIS’ Benchmarks. NeuVector has released the beta implementation of the benchmarks developed by the OpenShift team which have been submitted to the CIS.org organization for official adoption. By enabling OpenShift customers to access and run these important configuration and security checks, NeuVector is providing early visibility into compliance auditing for OpenShift deployments.
These add to other enhanced Red Hat and OpenShift security features in NeuVector, such as:
- Support for ImageStreams on-demand scanning for OpenShift registries
- Integration with the OpenShift Admission Controller to prevent unauthorized and vulnerable image deployments into production
- Integration with OpenShift RBACs to enable OpenShift users with similar access controls in NeuVector
- Certified NeuVector Operator in the Red Hat Marketplace
- Support for the OpenShift default run-time CRI-O
- Support of Custom Resource Definitions in OpenShift to define Security Policy as Code for NeuVector run-time protections including network firewall, process and file access rules.
Together these new and existing capabilities enable the NeuVector container security platform to provide:
- End-to-end Vulnerability and Compliance management
- Security automation in the pipeline and into production.
- Protection against zero-day attacks, vulnerability exploits, malware, and other network threats through a run-time security solution powered by a Layer7 container firewall.
It Starts With Accurate Vulnerability Scanning
The Red Hat Vulnerability Scanner Certification brings standardization to vulnerability risk reporting for customers. Enterprises have faced challenging uncertainty in this area as they scale up cloud native initiatives; security reporting based on varying data sources can lead to unreliable and inconsistent vulnerability risk assessments. With the launch of this partner certification offering, Red Hat customers using the security solutions of certified partners like NeuVector now can access vulnerability risk reporting that is accurate and standardized with Red Hat’s own published security data.
To verify product and package vulnerabilities with standardization, NeuVector consumes the publicly available Red Hat OVAL v2 security data feed. This feed streams data on common vulnerabilities and exposures (CVEs), and includes frequent updates to incorporate customer and partner feedback. NeuVector ingests this data feed within its own platform to optimize the integrity and accuracy of assessments. NeuVector is also able to display the Red Hat severity rating of specific CVEs, and provide mission-critical container security insights for addressing both patched and unpatched vulnerabilities.
In the screen shot below, vulnerabilities discovered which are fixed by Red Hat are shown as their RHSA identifiers to indicate this are fixable vulnerabilities in the scanned image:
Vulnerabilities for which a fix is not available are shown with their traditional CVE number identifiers, as shown below:
“As a certified Red Hat Vulnerability Scanner partner, we’re able to offer organizations valuable visibility into both patched and unpatched Red Hat vulnerabilities, and do so with the same accuracy and transparency available from Red Hat itself,” said Gary Duan, Chief Technology Officer at NeuVector. “We look forward to ensuring that our customers using Red Hat products have the most complete capabilities available today when it comes to recognizing and mitigating security issues threatening their cloud native environments.”
In addition to consuming the OVAL v2 security data feed, NeuVector supports other CVE data sources and regularly monitors applications and languages (such as java, nodejs, python, ruby) for vulnerabilities.
Adding Compliance and Components to Scans
In addition to scanning for vulnerabilities, NeuVector scans images for compliance violations and reports the components list discovered in the image. This is useful for identifying compliance violations for the various CIS benchmarks tests, as well as discovering risky practices in images such as embedded secrets and open file access permissions:
The module inventory and vulnerability risk by module is shown as below:
Putting It Together – Security from the Pipeline to Production
By building security into the pipeline and scanning images during build and in registries, vulnerable or non-compliant images can be prevented from being deployed into production. The screen shot below shows admission control rules which can be created to block deployments based on scan results:
Once in production, continuous vulnerability scanning and CIS benchmarks are run, including the draft OpenShift benchmarks, as seen below indicated by OpenShift-4.5-Beta:
As the final, and most important security protection, running container workloads are inspected in real-time to determine if network attacks, segmentation violations, DLP violations, or suspicious processes/file activity are occurring. These can be blocked in real-time before the attack is able to penetrate or expand across the infrastructure:
Securing images, containers, workloads and orchestrators (like OpenShift) requires end-to-end security which can be integrated into key points in the pipeline. The integration is critical to be able to automate security configurations and keep them updated as new applications enter the pipeline and move into production.
저자 소개
Red Hatter since 2018, technology historian and founder of The Museum of Art and Digital Entertainment. Two decades of journalism mixed with technology expertise, storytelling and oodles of computing experience from inception to ewaste recycling. I have taught or had my work used in classes at USF, SFSU, AAU, UC Law Hastings and Harvard Law.
I have worked with the EFF, Stanford, MIT, and Archive.org to brief the US Copyright Office and change US copyright law. We won multiple exemptions to the DMCA, accepted and implemented by the Librarian of Congress. My writings have appeared in Wired, Bloomberg, Make Magazine, SD Times, The Austin American Statesman, The Atlanta Journal Constitution and many other outlets.
I have been written about by the Wall Street Journal, The Washington Post, Wired and The Atlantic. I have been called "The Gertrude Stein of Video Games," an honor I accept, as I live less than a mile from her childhood home in Oakland, CA. I was project lead on the first successful institutional preservation and rebooting of the first massively multiplayer game, Habitat, for the C64, from 1986: https://neohabitat.org . I've consulted and collaborated with the NY MOMA, the Oakland Museum of California, Cisco, Semtech, Twilio, Game Developers Conference, NGNX, the Anti-Defamation League, the Library of Congress and the Oakland Public Library System on projects, contracts, and exhibitions.
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
오리지널 쇼
엔터프라이즈 기술 분야의 제작자와 리더가 전하는 흥미로운 스토리
제품
- Red Hat Enterprise Linux
- Red Hat OpenShift Enterprise
- Red Hat Ansible Automation Platform
- 클라우드 서비스
- 모든 제품 보기
툴
체험, 구매 & 영업
커뮤니케이션
Red Hat 소개
Red Hat은 Linux, 클라우드, 컨테이너, 쿠버네티스 등을 포함한 글로벌 엔터프라이즈 오픈소스 솔루션 공급업체입니다. Red Hat은 코어 데이터센터에서 네트워크 엣지에 이르기까지 다양한 플랫폼과 환경에서 기업의 업무 편의성을 높여 주는 강화된 기능의 솔루션을 제공합니다.