Deep Security Container Protection Customer Presentation
Deep Security Container Protection Customer Presentation
“Having a partner like Trend Micro who keeps pace with changes in the threat environment
is critical to maintaining the highest level of security."
CISO, Orion Health
Container Security Challenges
Challenges With Securing Containers
Unsecured pipeline risks Impact on continuous releases Vendor and tool proliferation
DevOps teams are focused on Security teams are negatively IT thinks they need a container
application output and uptime impacted by the limited ways they specific product separate from a
overlooking IT Security protocols can protect continuously delivered unified solution which leads to
and early warning threat signals container applications and allow additional tools and environment
DevOps to move faster complexity
Full Lifecycle, Full Stack Container Security
Attacks against OS
hosting containers
Commit Build Push Deploy
Advanced Intrusion
Anti-Malware Prevention
Application
Control
Cloud Intrusion Trend Micro
WorkloadPrevention
Full Life Cycle,
Vulnerability
Container Threats Integrity Container Container Full Stack
Protection Monitoring Platform
Images Integrity
Monitoring
Container Security
Physical or
Anti-malware
Virtual Server
Log
Secrets Inspection
Advanced
Anti-malware
Custom/IoC Sweeping
Container Security
8 Copyright 2019 Trend Micro Inc. Full Lifecycle, Full Stack Container Security
"We’re able to protect a container pre-runtime by
What Our Customers are Saying understanding what’s going on in the environment from
a security perspective before it even hits production."
Jason Cradit
Sector Information Technology | Pivvot
“Using Deep Security, we were able to improve our efficiency with Docker
containers to realize savings for our AWS licenses and compute costs ,”
Todd Williams – Manager SecOps at MEDHOST
"Trend Micro is extremely quick to support new technologies, and
successfully strengthened the security of our service platform, which
uses Docker and Kubernetes. ” Shunsuke Shiina - HUE & ATE Div. ATE
Dept. Works Applications Co., Ltd.
ECR
DTR
GCR
What Our Customers are Saying
Attacks against OS
hosting containers
Commit Build Push Deploy
Image Assertion:
• Allow or Block based on scan results
• Only valid “good” clean images
proceed through pipeline
• Deliver scan details of invalid “bad”
images to Developers for
remediation
Fully Automated Pipeline Scanning
23 Copyright 2019 Trend Micro Inc.
Full Coverage Vulnerability Scanning
• Security and Compliance
• Local and Remote vulnerabilities Source Install
Sign/Promote
Remediate
27 Copyright 2019 Trend Micro Inc.
Deep Security
Container Protection
Runtime Container Security
Growing Threats Across Container Environments
Software Build Pipeline Host Runtime
Vulnerable code Attacks against
Malware from public sources running applications
Embedded secrets
Non-compliant content
Attacks against
container platforms
Attacks against OS
hosting containers
Commit Build Push Deploy
Container n
Container 1
Container 2
of Container traffic
• When “Scan Container Network Traffic” is enabled
o The network traffic hook point is moved local to the container
interface …
o All container traffic, including inter-container “East-West”
traffic is scanned Docker
o Detection accuracy is not impacted by Docker port mappings
Host OS
App D
App A
App B
App C
App E
App F
instances
– Software upgrades, downgrades or removal Docker Engine
– IPtables rules
– Permissions for key directories
32 Copyright 2019 Trend Micro Inc.
Kubernetes and Docker Monitoring
App D
App F
App E
App C
App B
App A
Container Protection
0% 40% 80%
Percentage of Respondents
2019
+
Market Guide for
Cloud Workload
21 of 25
Additional Criteria*
Protection Platforms
Trend Micro delivers the
most cloud security
controls and criteria of
Free Download all security vendors*
37 Copyright 2019 Trend Micro Inc.
* As assessed by Trend Micro
Hybrid Cloud Security Solution
Software Build Pipeline Runtime / Deployed
Vulnerability Malware Sweeping Intrusion Firewall Vulnerability Application Integrity Log Anti- Behavioral Analysis Sandbox
Scanning Detection & Hunting Prevention Scanning Control Monitoring Inspection Malware Machine Learning Analysis
Smart Check Scan Architecture
Content
Docs Scan
dstf.trendmicro.com
Events
ECR
Frontend
GCR DTR Malware
Scan
Scan Alerts
Deep Security
Smart Check
39 Copyright 2019 Trend Micro Inc.
Deep Security Container Control (Preview available soon)
• DS users can create and
enforce Container Control
policies
• Initial Controls
– Privileged containers
• Smart Check Integration
– Scanned Images
– Vulnerability thresholds
– Malware rule
• Addt’l Future Controls:
– Authorized Registries
– Validated Seccomp profile
– Etc…
40 Copyright 2019 Trend Micro Inc.
Deep Security Container Vulnerability Shielding (12.x)
3 DSM builds IPS Ruleset