DEMO RECORDING - Understand the Docker Container Image Test Results

  Рет қаралды 646

Cryptosense

Cryptosense

Күн бұрын

Last month we decided it would be interesting to test the 50 most popular Docker base images with Cryptosense Analyzer to see what we could find. You can explore the report for yourself here: cryptosense.co...
More and more of us deliver our applications in containers. Often, we build our final container images on existing base images, which means our production deployments inherit everything that’s in there. It’s a well-known best practice to scan the base image for vulnerabilities using a software composition analysis (SCA) tool to check for vulnerable components, and ensure there are no private keys or credentials accidentally checked in there.
But what about the cryptographic artifacts, like keys and certificates, that I inherit from my base image. How secure and compliant are those? Do they imply trust in servers that I want my final application to trust?
To find out, we ran our container cryptography scanner over the 50 most popular Docker base images and sent the results to Cryptosense Analyzer Platform (CAP). You can see the results for yourself by opening up a free access to CAP (the Docker image results are preloaded on free accounts).
Highlights include self-signed certificates, private keys, and insecure keys including 1024-bit DSA and RSA code-signing keys.
Note that none of these constitute immediate vulnerabilities in the base image - otherwise we wouldn’t be revealing them publicly. Indeed, in some cases, they show how a holistic cryptography scan avoids some of the false-positive issues associated with typical private-key scans. However, they certainly bring to light things you don’t want in your final deployed artifacts - particularly if you operate with sensitive data or in regulated environments.
The good news is that, with a CAP free account, you can also scan your own final container images and get a full crypto inventory and vulnerability analysis. In the next few weeks, we’ll be explaining how you can use this to set up container crypto checks in your CI/CD pipeline with our integrations. Even better, we’ll show you how you can audit the cryptographic operations your application really makes with our application tracers, and cross-reference the results, all in the same account. So you might like to sign up for one now: cryptosense.co...
/////
Find out more about Cryptosense: cryptosense.com
Follow us on Twitter: / cryptosense
/////
Cryptosense CEO Dr. Graham Steel was formerly an academic researcher before founding Cryptosense in 2013. His cryptography expertise is the basis for the company's 'Analyzer' technology which allows customers to protect themselves against losing sensitive data.

Пікірлер
Build YOUR OWN Dockerfile, Image, and Container - Docker Tutorial
18:20
Air Sigma Girl #sigma
0:32
Jin and Hattie
Рет қаралды 45 МЛН
Sigma girl VS Sigma Error girl 2  #shorts #sigma
0:27
Jin and Hattie
Рет қаралды 124 МЛН
JISOO - ‘꽃(FLOWER)’ M/V
3:05
BLACKPINK
Рет қаралды 137 МЛН
Best Docker Containers in 2024
12:43
VirtualizationHowto
Рет қаралды 183 М.
Quantum Random Number Generation - Do we really need it?
8:59
Cryptosense
Рет қаралды 4 М.
Get started with Docker and Tailscale
14:04
Tailscale
Рет қаралды 44 М.
Top 10 Docker Container Security Best Practices with Tutorial
41:16
Cloud Security Podcast
Рет қаралды 7 М.
Testcontainers - From Zero to Hero. By @MarcoCodes
1:01:29
IntelliJ IDEA, a JetBrains IDE
Рет қаралды 77 М.
Webinar Recording: How to Make an Application FIPS 140 Compliant
32:15
Dockerfile >Docker Image > Docker Container | Beginners Hands-On | Step by Step
17:58
What do Germany and France think about Post-Quantum Cryptography?
5:44
WEBINAR RECORDING: Cryptography Failures - Part 1
26:27
Cryptosense
Рет қаралды 1,9 М.
Prompt Engineering, RAG, and Fine-tuning: Benefits and When to Use
15:21