Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Run Apps in Docker if You Want Application Security

    By
    Sean Michael Kerner
    -
    August 24, 2016
    Share
    Facebook
    Twitter
    Linkedin
      Docker

      When any new technology appears on the scene, security is typically a barrier to adoption. When it comes to Docker containers, though, two organizations now are making the claim that security should be a driver of adoption.

      Analyst firm Gartner and cyber-security specialist NCC Group have published research detailing the container security landscape.

      “The significant piece of this is that Gartner is at the point where they think applications are more secure running in Docker containers and are communicating this out to their enterprise users,” Nathan McCauley, director of security at Docker Inc., told eWEEK. “It is significant in combination with the NCC Group report, which recognizes Docker’s leadership in the area of container security.”

      Gartner analyst Joerg Fritsch wrote that an application that is deployed in a container is in fact more secure than the same application running on a bare-metal operating system because “applications and users are isolated on a per-container basis so that they cannot compromise other containers or the host OS.”

      The NCC Group report stated that “from a security perspective, [containers] create a method to reduce attack surfaces and isolate applications to only the required components, interfaces, libraries and network connections.”

      McCauley published a blog post on Aug. 23 that included a chart showing some of the key security features enabled by Docker and how it compares to other container options. Among those features is a capability called seccomp filtering that was first added to the Docker 1.10 update that came out in February. Seccomp is a technology that is integrated into the main line of the Linux kernel to provide granular security control.

      The most recent release of Docker is version 1.12, announced at DockerCon in June.

      “The Gartner report already takes into account 1.12 security features, which include built-in certificate authority, mutual TLS [Transport Layer Security] authentication and authorization between all nodes as well as cryptographic node identities,” McCauley said. “In particular, cryptographic node identities are one of the fundamental building blocks that will enable future security features.”

      The fact that Docker has multiple levels of security doesn’t mean, however, that all Docker users are secure by default. Properly securing a Docker container environment involves making use of the security capabilities that Docker provides as well as best practices for configuration. That’s the rationale behind the Docker Bench tool released in May 2015. Docker security has improved since then, and Docker Bench is set to keep up.

      “We are updating Docker Bench to take advantage of the new orchestration features that shipped in 1.12 and continue to update our sysbench release for every benchmark that comes out,” McCauley said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Avatar
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×