Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps

In recent years, the security of containers has become a crucial aspect of modern software applications’ security and integrity. Containers are extensively used due to their lightweight and portable nature, allowing swift and agile deployment across different environments. However, the increasing po...

Full description

Saved in:
Bibliographic Details
Main Authors: Santosh Ugale, Amol Potgantwar
Format: Article
Language:English
Published: MDPI AG 2023-12-01
Series:Engineering Proceedings
Subjects:
Online Access:https://www.mdpi.com/2673-4591/59/1/57
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850205675615944704
author Santosh Ugale
Amol Potgantwar
author_facet Santosh Ugale
Amol Potgantwar
author_sort Santosh Ugale
collection DOAJ
description In recent years, the security of containers has become a crucial aspect of modern software applications’ security and integrity. Containers are extensively used due to their lightweight and portable nature, allowing swift and agile deployment across different environments. However, the increasing popularity of containers has led to unique security risks, including vulnerabilities in container images, misconfigured containers, and insecure runtime environments. Containers are often built using public repository images and base image vulnerability is inherited by containers. Container images may contain outdated components or services, including system libraries and dependencies and known vulnerabilities from these components can be exploited. Images downloaded from untrusted sources may include malicious code that compromises other containers running in the same network or the host system. Base images may include unnecessary software or services that increase the attack surface and potential vulnerabilities. Several security measures have been implemented to address these risks, such as container image scanning, container orchestration security, and runtime security monitoring. Implementing a solid security policy and updating containers with the latest patches can significantly improve container security. Given the increasing adoption of containers, organizations must prioritize container security to protect their applications and data. This work presents automated, robust security techniques for continuous integration and continuous development pipelines, and the added overhead is empirically analyzed. Then, we nail down specific research and technological problems the DevSecOps community encounters and appropriate initial fixes. Our results will make it possible to make judgments that are enforced when using DevSecOps techniques in enterprise security and cloud-native applications.
format Article
id doaj-art-e63496c57697465d96cc4df2fd2be71b
institution OA Journals
issn 2673-4591
language English
publishDate 2023-12-01
publisher MDPI AG
record_format Article
series Engineering Proceedings
spelling doaj-art-e63496c57697465d96cc4df2fd2be71b2025-08-20T02:11:01ZengMDPI AGEngineering Proceedings2673-45912023-12-015915710.3390/engproc2023059057Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOpsSantosh Ugale0Amol Potgantwar1Department of Computer Science and Engineering, MET Institute of Engineering, Affiliated to Savitribai Phule Pune University (SPPU), Nashik 422003, Maharashtra, IndiaDepartment of Computer Engineering, Sandip Institute of Technology and Research Center Affiliated to Savitribai Phule Pune University (SPPU), Nashik 422213, Maharashtra, IndiaIn recent years, the security of containers has become a crucial aspect of modern software applications’ security and integrity. Containers are extensively used due to their lightweight and portable nature, allowing swift and agile deployment across different environments. However, the increasing popularity of containers has led to unique security risks, including vulnerabilities in container images, misconfigured containers, and insecure runtime environments. Containers are often built using public repository images and base image vulnerability is inherited by containers. Container images may contain outdated components or services, including system libraries and dependencies and known vulnerabilities from these components can be exploited. Images downloaded from untrusted sources may include malicious code that compromises other containers running in the same network or the host system. Base images may include unnecessary software or services that increase the attack surface and potential vulnerabilities. Several security measures have been implemented to address these risks, such as container image scanning, container orchestration security, and runtime security monitoring. Implementing a solid security policy and updating containers with the latest patches can significantly improve container security. Given the increasing adoption of containers, organizations must prioritize container security to protect their applications and data. This work presents automated, robust security techniques for continuous integration and continuous development pipelines, and the added overhead is empirically analyzed. Then, we nail down specific research and technological problems the DevSecOps community encounters and appropriate initial fixes. Our results will make it possible to make judgments that are enforced when using DevSecOps techniques in enterprise security and cloud-native applications.https://www.mdpi.com/2673-4591/59/1/57container securityDevSecOpsDevOpsautomationcontainerization
spellingShingle Santosh Ugale
Amol Potgantwar
Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps
Engineering Proceedings
container security
DevSecOps
DevOps
automation
containerization
title Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps
title_full Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps
title_fullStr Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps
title_full_unstemmed Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps
title_short Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps
title_sort container security in cloud environments a comprehensive analysis and future directions for devsecops
topic container security
DevSecOps
DevOps
automation
containerization
url https://www.mdpi.com/2673-4591/59/1/57
work_keys_str_mv AT santoshugale containersecurityincloudenvironmentsacomprehensiveanalysisandfuturedirectionsfordevsecops
AT amolpotgantwar containersecurityincloudenvironmentsacomprehensiveanalysisandfuturedirectionsfordevsecops