SlideShare a Scribd company logo
Know What’s in Your
Containers!
Manage and Secure all Open Source that composes
your Containers
Container Security Tool Landscape
SERVER
HOST OS
CONTAINER ENGINE
BINS / LIBS BINS / LIBS
APPLICATION 1 APPLICATION 2 Static Analysis
Best for Developer Custom Code
Software Composition
Best for Open Source
Dynamic Analysis
Best for Runtime
DEVELOPMENT
DEPLOYMENT
NETWORK
We help you build secure, high-quality
software faster
Integrated
Tools
Managed
Services
Strategy &
Planning
Program
Acceleration
Build Security In Maturity Model (BSIMM)
Static
Analysis
Find and fix security vulnerabilities
and quality issues in your code as
it’s being developed
Coverity
Software Composition
Analysis
Detect and manage open source
and 3rd party component risks in
development and production
Black Duck
Dynamic
Analysis
Test running applications for
common security weaknesses
and vulnerabilities
Seeker
Defensics
DevSecOps
Integration
Architecture
and Design
Security
Training
Cloud
Security
Industry
Solutions
Maturity Action Plan (MAP)
• Full Container Scanning
• Packaged Apps
• Linux Distro and Other Software
• Scans containers on Docker host
• No need to modify containers
• Deeper Identification
• All Open Source in Container
• Linux distribution files
• Patches
• Vulnerability Mapping
• OSS Components and Versions
Visibility and Control for Containers
State of Open Source 2018
Based on over 1,100 commercial applications analyzed by Black Duck On-Demand
17% 8%
96%
134% 54%HIGH
57%
Problem: Security Breaches
206 days
Average cost of data breach:
$7.35 Million
Lost business:
$4.03 Million
Average time to identify and
contain a breach:
Source: 2017 Cost of Data Breach Study – Ponemon Institute
Apache Struts
Strutting around?
Taxes due
April 30th
CRA site
shut down
CVE-2017-5638
Reported by NVD
March 10th
Public Exploit
March 7th
Introduced
v2.3.5
Fall, 2012 July 29th
Equifax site
shut down
Reported by
Nike Zheng
Patch available
March 6th, 2017
EnhancedVULNERABILITY DATA
10,000+SOURCES
1+
PETABYTES
80+
PROGRAMMING LANGUAGES
14
YRS OSS ACTIVITY
Open Source Intelligence
60
DEDICATED KB TEAM
BLACK DUCK
KNOWLEDGEBASE
Black Duck Hub Architecture
Hub Detect Scan Hub Web Application
HTTPS
On-Premise or Private Cloud
Black Duck
KnowledgeBase
HTTPS
Black Duck Datacenter
IDE SCM Build/CI QA Orchestration ProductionDeployTestBuild / CISCMCode
TFS/VSTS
CodeBuild
CodePipeline
Concourse
Team City
Eclipse
Visual Studio
GitHub
Package
Management
Container/Binary
Repositories
Black Duck Integrations
ECR
GCR
ACR
Artifactory
Red Hat
Container Catalog
Ruby
Linux
Package Managers
XRay
OpenShift1
Kubernetes1
Pivotal
Cloud Foundry2
Cloud Foundry2
EC2
GCP
Azure
OpenShift3
Kubernetes3
1 Automatic Image scanning during orchestration
2 Automatic droplet scanning during cf push
3 Deployable on these platforms
Chrome
TravisGitLab
Addressing OpenShift Customer Security Needs
with
Automatically scan and monitor 3rd party Open Source in all container images in OpenShift
Installed as an OpenShift project
that is integrated into the
OpenShift API.
Continuously annotates and labels
images and pods when vulnerabilities
or policy violations occur.
Operating System and application
Open Source including non-curated
Red Hat software.
Regardless of image source
or registry.
Open Source software
composition of the
container image.
POD
Container Platform
Black Duck OpenShift Integration Architecture
External
Registries
KnowledgeBase
MASTER
NODE NODE
POD
INTEGRATED REGISTRY
POD
POD
.
.
.
Labels
Labels
Labels & annotations
Labels
Labels
NODE
POD
POD
Labels
Labels
NODE
POD
POD
Labels
Labels
OpsSight
Image
processor
Pod
processor
Policy Management
Security Risk
Scan job runners
horizontal scaling
Core
Image and Pod API
Prometheus
Scanner
Image getter
horizontal scaling
Layer Container Security For Maximum Impact
üSecure Platform with Red Hat OpenShift Container Platform and RHEL Atomic Host
üAdminister DISA STIG: CVE, CCE, CPE, CVSS, OVAL, and XCCDF
üOVAL formatted patch definitions for Red Hat products
üScan all container images in an OpenShift deployment as the are created, modified and
used
üProvide visibility into open source components regardless of source
üAnnotate images and image streams with vulnerability information
üAnnotations automatically updated as new disclosures occur – without the need for rescan
Demo!
Know What’s in Your Containers! Manage and Secure all Open Source that Composes All Your Containers

More Related Content

What's hot (20)

PDF
The Future of Security and Productivity in Our Newly Remote World
DevOps.com
 
PDF
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Black Duck by Synopsys
 
PPTX
Perforce on Tour 2015 - DVCS in the Enterprise: Introducing Helix DVCS and Gi...
Perforce
 
PDF
Continuous Security for GitOps
Weaveworks
 
PDF
Integrating Black Duck into Your Environment with Hub APIs
Black Duck by Synopsys
 
PDF
Secure GitOps pipelines for Kubernetes with Snyk & Weaveworks
Weaveworks
 
PPTX
K8Guard - An Auditing System For Kubernetes
Medya Ghazizadeh
 
PDF
stackconf 2021 | Embracing change: Policy-as-code for Kubernetes with OPA and...
NETWAYS
 
PDF
stackconf 2021 | Continuous Security – integrating security into your pipelines
NETWAYS
 
PPTX
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
PPTX
Scania: A DevOps Journey in an Automotive Enterprise  
Perforce
 
PDF
Dockerfy Your CI/CD - DevOpsDays Austin 2014
DevOpsDays Austin 2014
 
PDF
Sec4dev 2021 - Catch Me If You can : Continuous Delivery vs. Security Assurance
Abdessamad TEMMAR
 
PDF
Hardening Your CI/CD Pipelines with GitOps and Continuous Security
Weaveworks
 
PDF
Connect Ops and Security with Flexible Web App and API Protection
DevOps.com
 
PDF
6. Analyzing Android Applications Part 2
Sam Bowne
 
PDF
DevSecOps: The Open Source Way
Gordon Haff
 
PPTX
Vulnerability Testing in the Cloud by dint of DevSecOps
Owen Byrne
 
PDF
DevSecOps Basics with Azure Pipelines
Abdul_Mujeeb
 
PDF
CNIT 128 7. Attacking Android Applications (Part 2)
Sam Bowne
 
The Future of Security and Productivity in Our Newly Remote World
DevOps.com
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Black Duck by Synopsys
 
Perforce on Tour 2015 - DVCS in the Enterprise: Introducing Helix DVCS and Gi...
Perforce
 
Continuous Security for GitOps
Weaveworks
 
Integrating Black Duck into Your Environment with Hub APIs
Black Duck by Synopsys
 
Secure GitOps pipelines for Kubernetes with Snyk & Weaveworks
Weaveworks
 
K8Guard - An Auditing System For Kubernetes
Medya Ghazizadeh
 
stackconf 2021 | Embracing change: Policy-as-code for Kubernetes with OPA and...
NETWAYS
 
stackconf 2021 | Continuous Security – integrating security into your pipelines
NETWAYS
 
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
Scania: A DevOps Journey in an Automotive Enterprise  
Perforce
 
Dockerfy Your CI/CD - DevOpsDays Austin 2014
DevOpsDays Austin 2014
 
Sec4dev 2021 - Catch Me If You can : Continuous Delivery vs. Security Assurance
Abdessamad TEMMAR
 
Hardening Your CI/CD Pipelines with GitOps and Continuous Security
Weaveworks
 
Connect Ops and Security with Flexible Web App and API Protection
DevOps.com
 
6. Analyzing Android Applications Part 2
Sam Bowne
 
DevSecOps: The Open Source Way
Gordon Haff
 
Vulnerability Testing in the Cloud by dint of DevSecOps
Owen Byrne
 
DevSecOps Basics with Azure Pipelines
Abdul_Mujeeb
 
CNIT 128 7. Attacking Android Applications (Part 2)
Sam Bowne
 

Similar to Know What’s in Your Containers! Manage and Secure all Open Source that Composes All Your Containers (20)

PDF
5 Ways to Secure Your Containers for Docker and Beyond
Black Duck by Synopsys
 
PPTX
The How and Why of Container Vulnerability Management
Tim Mackey
 
PPTX
The How and Why of Container Vulnerability Management
Black Duck by Synopsys
 
PPTX
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Shannon Williams
 
PPT
20160221 va interconnect_pub
Canturk Isci
 
PDF
Operational Visibiliy and Analytics - BU Seminar
Canturk Isci
 
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon
 
PPTX
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Black Duck by Synopsys
 
PDF
Skip the anxiety attack when building secure containerized apps
Haidee McMahon
 
PDF
Docker security introduction-task-2016
Ricardo Gerardi
 
PDF
Red Hat Container Strategy
Red Hat Events
 
PDF
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDays Riga
 
PDF
Secure Application Development in the Age of Continuous Delivery
Black Duck by Synopsys
 
PPTX
Secure Application Development in the Age of Continuous Delivery
Tim Mackey
 
PDF
DCSF 19 Building Your Development Pipeline
Docker, Inc.
 
PDF
Transforming Application Delivery with PaaS and Linux Containers
Giovanni Galloro
 
PDF
Docker for developers
andrzejsydor
 
PDF
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Sysdig
 
PPTX
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Black Duck by Synopsys
 
PPTX
Understanding container security
John Kinsella
 
5 Ways to Secure Your Containers for Docker and Beyond
Black Duck by Synopsys
 
The How and Why of Container Vulnerability Management
Tim Mackey
 
The How and Why of Container Vulnerability Management
Black Duck by Synopsys
 
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Shannon Williams
 
20160221 va interconnect_pub
Canturk Isci
 
Operational Visibiliy and Analytics - BU Seminar
Canturk Isci
 
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon
 
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Black Duck by Synopsys
 
Skip the anxiety attack when building secure containerized apps
Haidee McMahon
 
Docker security introduction-task-2016
Ricardo Gerardi
 
Red Hat Container Strategy
Red Hat Events
 
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDays Riga
 
Secure Application Development in the Age of Continuous Delivery
Black Duck by Synopsys
 
Secure Application Development in the Age of Continuous Delivery
Tim Mackey
 
DCSF 19 Building Your Development Pipeline
Docker, Inc.
 
Transforming Application Delivery with PaaS and Linux Containers
Giovanni Galloro
 
Docker for developers
andrzejsydor
 
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Sysdig
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Black Duck by Synopsys
 
Understanding container security
John Kinsella
 
Ad

More from DevOps.com (20)

PDF
Modernizing on IBM Z Made Easier With Open Source Software
DevOps.com
 
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
DevOps.com
 
PPTX
Vulnerability Discovery in the Cloud
DevOps.com
 
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
DevOps.com
 
PDF
A New Year’s Ransomware Resolution
DevOps.com
 
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
DevOps.com
 
PDF
Don't Panic! Effective Incident Response
DevOps.com
 
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
DevOps.com
 
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
DevOps.com
 
PDF
Monitoring Serverless Applications with Datadog
DevOps.com
 
PDF
Deliver your App Anywhere … Publicly or Privately
DevOps.com
 
PPTX
Securing medical apps in the age of covid final
DevOps.com
 
PDF
How to Build a Healthy On-Call Culture
DevOps.com
 
PPTX
The Evolving Role of the Developer in 2021
DevOps.com
 
PDF
Service Mesh: Two Big Words But Do You Need It?
DevOps.com
 
PPTX
Secure Data Sharing in OpenShift Environments
DevOps.com
 
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
DevOps.com
 
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
DevOps.com
 
Modernizing on IBM Z Made Easier With Open Source Software
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
DevOps.com
 
Vulnerability Discovery in the Cloud
DevOps.com
 
2021 Open Source Governance: Top Ten Trends and Predictions
DevOps.com
 
A New Year’s Ransomware Resolution
DevOps.com
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
DevOps.com
 
Don't Panic! Effective Incident Response
DevOps.com
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
DevOps.com
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
DevOps.com
 
Monitoring Serverless Applications with Datadog
DevOps.com
 
Deliver your App Anywhere … Publicly or Privately
DevOps.com
 
Securing medical apps in the age of covid final
DevOps.com
 
How to Build a Healthy On-Call Culture
DevOps.com
 
The Evolving Role of the Developer in 2021
DevOps.com
 
Service Mesh: Two Big Words But Do You Need It?
DevOps.com
 
Secure Data Sharing in OpenShift Environments
DevOps.com
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
DevOps.com
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
DevOps.com
 
Ad

Recently uploaded (20)

PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
July Patch Tuesday
Ivanti
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 

Know What’s in Your Containers! Manage and Secure all Open Source that Composes All Your Containers

  • 1. Know What’s in Your Containers! Manage and Secure all Open Source that composes your Containers
  • 2. Container Security Tool Landscape SERVER HOST OS CONTAINER ENGINE BINS / LIBS BINS / LIBS APPLICATION 1 APPLICATION 2 Static Analysis Best for Developer Custom Code Software Composition Best for Open Source Dynamic Analysis Best for Runtime DEVELOPMENT DEPLOYMENT NETWORK
  • 3. We help you build secure, high-quality software faster Integrated Tools Managed Services Strategy & Planning Program Acceleration Build Security In Maturity Model (BSIMM) Static Analysis Find and fix security vulnerabilities and quality issues in your code as it’s being developed Coverity Software Composition Analysis Detect and manage open source and 3rd party component risks in development and production Black Duck Dynamic Analysis Test running applications for common security weaknesses and vulnerabilities Seeker Defensics DevSecOps Integration Architecture and Design Security Training Cloud Security Industry Solutions Maturity Action Plan (MAP)
  • 4. • Full Container Scanning • Packaged Apps • Linux Distro and Other Software • Scans containers on Docker host • No need to modify containers • Deeper Identification • All Open Source in Container • Linux distribution files • Patches • Vulnerability Mapping • OSS Components and Versions Visibility and Control for Containers
  • 5. State of Open Source 2018 Based on over 1,100 commercial applications analyzed by Black Duck On-Demand 17% 8% 96% 134% 54%HIGH 57%
  • 6. Problem: Security Breaches 206 days Average cost of data breach: $7.35 Million Lost business: $4.03 Million Average time to identify and contain a breach: Source: 2017 Cost of Data Breach Study – Ponemon Institute
  • 7. Apache Struts Strutting around? Taxes due April 30th CRA site shut down CVE-2017-5638 Reported by NVD March 10th Public Exploit March 7th Introduced v2.3.5 Fall, 2012 July 29th Equifax site shut down Reported by Nike Zheng Patch available March 6th, 2017
  • 8. EnhancedVULNERABILITY DATA 10,000+SOURCES 1+ PETABYTES 80+ PROGRAMMING LANGUAGES 14 YRS OSS ACTIVITY Open Source Intelligence 60 DEDICATED KB TEAM BLACK DUCK KNOWLEDGEBASE
  • 9. Black Duck Hub Architecture Hub Detect Scan Hub Web Application HTTPS On-Premise or Private Cloud Black Duck KnowledgeBase HTTPS Black Duck Datacenter
  • 10. IDE SCM Build/CI QA Orchestration ProductionDeployTestBuild / CISCMCode TFS/VSTS CodeBuild CodePipeline Concourse Team City Eclipse Visual Studio GitHub Package Management Container/Binary Repositories Black Duck Integrations ECR GCR ACR Artifactory Red Hat Container Catalog Ruby Linux Package Managers XRay OpenShift1 Kubernetes1 Pivotal Cloud Foundry2 Cloud Foundry2 EC2 GCP Azure OpenShift3 Kubernetes3 1 Automatic Image scanning during orchestration 2 Automatic droplet scanning during cf push 3 Deployable on these platforms Chrome TravisGitLab
  • 11. Addressing OpenShift Customer Security Needs with Automatically scan and monitor 3rd party Open Source in all container images in OpenShift Installed as an OpenShift project that is integrated into the OpenShift API. Continuously annotates and labels images and pods when vulnerabilities or policy violations occur. Operating System and application Open Source including non-curated Red Hat software. Regardless of image source or registry. Open Source software composition of the container image.
  • 12. POD Container Platform Black Duck OpenShift Integration Architecture External Registries KnowledgeBase MASTER NODE NODE POD INTEGRATED REGISTRY POD POD . . . Labels Labels Labels & annotations Labels Labels NODE POD POD Labels Labels NODE POD POD Labels Labels OpsSight Image processor Pod processor Policy Management Security Risk Scan job runners horizontal scaling Core Image and Pod API Prometheus Scanner Image getter horizontal scaling
  • 13. Layer Container Security For Maximum Impact üSecure Platform with Red Hat OpenShift Container Platform and RHEL Atomic Host üAdminister DISA STIG: CVE, CCE, CPE, CVSS, OVAL, and XCCDF üOVAL formatted patch definitions for Red Hat products üScan all container images in an OpenShift deployment as the are created, modified and used üProvide visibility into open source components regardless of source üAnnotate images and image streams with vulnerability information üAnnotations automatically updated as new disclosures occur – without the need for rescan
  • 14. Demo!