CA Southern Africa unmasks container security

Issue 8 2022 Infrastructure, Information Security


Craig De Lucchi.

Container security is a fairly new technology, especially when viewed in the context of the speed-of-light technology changes in the 4th industrial revolution (4IR). Container technology itself is a topic that many security practitioners continue to find confusing, but its use is spreading fast, says Craig De Lucchi, account director, CA Southern Africa.

“Let’s unpack what does containerisation mean? While definitions differ, but only slightly in the wording, all come down to the same conclusion and that is that containerisation is a form of operating system (OS) virtualisation where applications that use a shared OS run in isolated user spaces, called containers. Software containers are lightweight, standalone, executable packages of software that include everything required to run them. Containers include code, runtime, settings, system libraries and tools and can be used with both Linux and Windows-based applications. By isolating software from its surroundings, software containers enable code to run consistently, regardless of the environment in which it is operating. In short, an application container is a fully packaged and portable computing environment.”

De Lucchi confirms adoption of software containers has risen dramatically as more organisations realise the benefits of this virtualised technology, however, despite the inherent value they add, software containers also bring significant risks. Lack of visibility into containers means security teams are often unable to discern whether there are issues within the code. Moreover, containers are rarely scanned for vulnerabilities before or after being deployed to production.

How to secure a software container

Let’s talk to the developers in a world where security skills are no longer optional for them. There are several steps that developers can take to help secure software containers. These include enforcing the use of trusted container image repositories, eliminating image clutter by continuously monitoring what’s inside containers, and using secrets management tools to protect sensitive data. Scanning software containers for vulnerabilities is also critical.

The Gartner Security & Risk Management Summit 2022 provided a number of recommendations and added clarity by segmenting container security into three sections:

• Securing container images.

• Securing the orchestration plane.

• Securing containers at runtime.

“So, in a business landscape constantly under threat from cyberattack vectors, the real issue to focus on is security. The upside of the coin is that while the security implications appear increasingly intense, it must be noted that solutions are evolving just as fast,” concludes De Lucchi.

For more information, contact CA Southern Africa, +27 11 417 8594, [email protected], www.ca.com/za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...
Managing stock efficiently and cost-effectively
Asset Management Infrastructure Logistics (Industry)
Rina Redelinghuys, customer services executive at Cquential, a member of the Argility Technology Group, examines stock management across various industries, including retail, fast-moving consumer goods, food and dairy, automotive, apparel, industrial, accessories, paint and chemicals, and pharmaceuticals.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
The hidden cost of cheap networking gear
Duxbury Networking Infrastructure
When it comes to building a network, price is always a consideration, especially in the current economic climate, but there is a difference between smart spending and short-term savings with long-term losses.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
Fastest PCIe Gen 5.0 NVMe SSD
Products & Solutions Infrastructure
Sandisk has unveiled the WD_BLACK SN8100 NVMe SSD with PCIe Gen 5.0 technology, an internal SSD delivering speeds up to 14 900 MB/s and capacities up to 4 TB, with 8 TB solutions available soon.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Unified storage solution
Products & Solutions Infrastructure
CASA Software has announced the local availability of Nexsan’s upgraded unified storage solution, Unity NV4000, which is ideal for mixed workloads, from virtualisation and video surveillance to secure backup and recovery.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.