Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps
In recent years, the security of containers has become a crucial aspect of modern software applications’ security and integrity. Containers are extensively used due to their lightweight and portable nature, allowing swift and agile deployment across different environments. However, the increasing po...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2023-12-01
|
| Series: | Engineering Proceedings |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2673-4591/59/1/57 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850205675615944704 |
|---|---|
| author | Santosh Ugale Amol Potgantwar |
| author_facet | Santosh Ugale Amol Potgantwar |
| author_sort | Santosh Ugale |
| collection | DOAJ |
| description | In recent years, the security of containers has become a crucial aspect of modern software applications’ security and integrity. Containers are extensively used due to their lightweight and portable nature, allowing swift and agile deployment across different environments. However, the increasing popularity of containers has led to unique security risks, including vulnerabilities in container images, misconfigured containers, and insecure runtime environments. Containers are often built using public repository images and base image vulnerability is inherited by containers. Container images may contain outdated components or services, including system libraries and dependencies and known vulnerabilities from these components can be exploited. Images downloaded from untrusted sources may include malicious code that compromises other containers running in the same network or the host system. Base images may include unnecessary software or services that increase the attack surface and potential vulnerabilities. Several security measures have been implemented to address these risks, such as container image scanning, container orchestration security, and runtime security monitoring. Implementing a solid security policy and updating containers with the latest patches can significantly improve container security. Given the increasing adoption of containers, organizations must prioritize container security to protect their applications and data. This work presents automated, robust security techniques for continuous integration and continuous development pipelines, and the added overhead is empirically analyzed. Then, we nail down specific research and technological problems the DevSecOps community encounters and appropriate initial fixes. Our results will make it possible to make judgments that are enforced when using DevSecOps techniques in enterprise security and cloud-native applications. |
| format | Article |
| id | doaj-art-e63496c57697465d96cc4df2fd2be71b |
| institution | OA Journals |
| issn | 2673-4591 |
| language | English |
| publishDate | 2023-12-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Engineering Proceedings |
| spelling | doaj-art-e63496c57697465d96cc4df2fd2be71b2025-08-20T02:11:01ZengMDPI AGEngineering Proceedings2673-45912023-12-015915710.3390/engproc2023059057Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOpsSantosh Ugale0Amol Potgantwar1Department of Computer Science and Engineering, MET Institute of Engineering, Affiliated to Savitribai Phule Pune University (SPPU), Nashik 422003, Maharashtra, IndiaDepartment of Computer Engineering, Sandip Institute of Technology and Research Center Affiliated to Savitribai Phule Pune University (SPPU), Nashik 422213, Maharashtra, IndiaIn recent years, the security of containers has become a crucial aspect of modern software applications’ security and integrity. Containers are extensively used due to their lightweight and portable nature, allowing swift and agile deployment across different environments. However, the increasing popularity of containers has led to unique security risks, including vulnerabilities in container images, misconfigured containers, and insecure runtime environments. Containers are often built using public repository images and base image vulnerability is inherited by containers. Container images may contain outdated components or services, including system libraries and dependencies and known vulnerabilities from these components can be exploited. Images downloaded from untrusted sources may include malicious code that compromises other containers running in the same network or the host system. Base images may include unnecessary software or services that increase the attack surface and potential vulnerabilities. Several security measures have been implemented to address these risks, such as container image scanning, container orchestration security, and runtime security monitoring. Implementing a solid security policy and updating containers with the latest patches can significantly improve container security. Given the increasing adoption of containers, organizations must prioritize container security to protect their applications and data. This work presents automated, robust security techniques for continuous integration and continuous development pipelines, and the added overhead is empirically analyzed. Then, we nail down specific research and technological problems the DevSecOps community encounters and appropriate initial fixes. Our results will make it possible to make judgments that are enforced when using DevSecOps techniques in enterprise security and cloud-native applications.https://www.mdpi.com/2673-4591/59/1/57container securityDevSecOpsDevOpsautomationcontainerization |
| spellingShingle | Santosh Ugale Amol Potgantwar Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps Engineering Proceedings container security DevSecOps DevOps automation containerization |
| title | Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps |
| title_full | Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps |
| title_fullStr | Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps |
| title_full_unstemmed | Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps |
| title_short | Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps |
| title_sort | container security in cloud environments a comprehensive analysis and future directions for devsecops |
| topic | container security DevSecOps DevOps automation containerization |
| url | https://www.mdpi.com/2673-4591/59/1/57 |
| work_keys_str_mv | AT santoshugale containersecurityincloudenvironmentsacomprehensiveanalysisandfuturedirectionsfordevsecops AT amolpotgantwar containersecurityincloudenvironmentsacomprehensiveanalysisandfuturedirectionsfordevsecops |