当前位置:网站首页>Safe landing practice of software supply chain under salesforce containerized ISV scenario
Safe landing practice of software supply chain under salesforce containerized ISV scenario
2022-06-27 11:45:00 【InfoQ】
Containerization ISV Security challenges for delivery
- Third party and open source components bring security risks : Enterprise software projects tend to rely more and more on components from the vendor tripartite or open source community , These components are often transferred in the software supply chain in the form of basic images . An attacker may exploit a vulnerability in the component , Inject malicious code or control the third-party machine environment , Perform mining from cryptocurrency 、 spam 、 To launch through a large botnet DDoS attack .
- The long link of software delivery buries more risks : From the demand analysis of software development stage 、 Code development 、 Integrate 、 test , To ISV Channel specific software delivery in the delivery phase 、 End customer acceptance , The end-user software in the final running phase runs 、 Operation and maintenance . The whole software supply chain has a long cycle , There may be safety risks in all links , Lead to software vulnerabilities 、 Software backdoor 、 Malicious tampering 、 Intellectual property risk 、 Information leakage and other security threats .
- Containerized operation introduces more risk attack surfaces : Container application deployment depends on Linux The kernel feature , Many hackers exploit kernel system vulnerabilities , Launch targeted escape or intrusion attacks from multiple dimensions such as container runtime components and container application deployment configuration . Recent years K8s、Docker、Istio And other open source communities have exposed many high-risk vulnerabilities , This provides an opportunity for the attacker .
Alibaba cloud native software supply chain solution

- Image content security ,ACR It provides an enhanced container image scanning engine jointly with the cloud security center , Cover system vulnerabilities 、 Application vulnerability 、 Risk types such as baseline inspection and malicious samples , High recognition rate 、 Low false positive rate vulnerability scanning capability . meanwhile , Provides container image repair capability , Support automated and efficient repair of risk vulnerabilities , Realize the security closed loop from discovery to repair .
- Image cross account delivery , For inter enterprise ISV Application delivery scenarios ,ACR Cross account synchronization capability is provided to ensure the distribution security of container image and signature .ISV Pass the image and the corresponding signature information through ACR Cross account synchronization capability is delivered to ISV Customer instance of . The corresponding image turns on the immutable image version , Ensure that the version of the image cannot be overwritten .ISV Our customers are ACK When deploying images on , Will be based on ISV Public key signature verification , Ensure that the image is complete and from ISV.
- Deploy policy management :ACK be based on OPA Policy engine and rich preset policy templates , Effective constraint application configuration security , Support container business YAML Multi dimensional deployment policy management , Avoid privilege containers 、 Risk image deployment and other risk behaviors , Strengthen the active management capability of container security on the cluster side .
- Safe sandbox container : The end customer uses a secure sandbox container as the runtime , Compared with the original Docker Runtime , Container applications can be run in a lightweight virtual machine sandbox environment , Have a separate kernel , Better security isolation capability , Compared with the community Kata Container More stable .
- Container runtime security : The end customer uses the runtime security monitoring and alarm capabilities of the cloud security center container , Including virus and malicious program attacks in the container or at the host level 、 Intrusions inside containers 、 Main container side attacks such as container escape and high-risk operation warning , Help customers find security threats in assets in a timely manner 、 Grasp the asset security situation in real time .
Alicloud carries Salesforce It has been awarded as an excellent case of software supply chain security of ICT Academy

Improve the security of the whole link
- Safe delivery : adopt ACR Cross user synchronization links ensure the distribution security of images and signatures . adopt ACR Image tagging and ACK Cross account verification ensures that the contents of the image are trusted . And because the whole delivery process is based on the exclusive synchronization link , It can ensure that the information transferred in the software supply chain will not be accidentally disclosed .
- The security policy : Turn on ACR Mirror security scan policy , Ensure the content security of the image while blocking the delivery of the risk image . The implementation of ACK OPA Deploy policy management , Ensure that the container application configuration is effectively constrained to block the operation of similar privileged containers .
- Safe operation : be based on ACK Safe sandbox container running container , The application runs in a lightweight virtual machine sandbox environment , Have a separate kernel , Better security isolation capability . Based on the cloud security center container runtime security monitoring and alarm capabilities , Avoid malicious attacks at the container or host level , Early warning of high-risk operations .
Improve the efficiency of safety management
- Highly automated : adopt ACR Automatic synchronization 、 Automatic scanning 、 Automatic endorsement ,ACK Automatic signature verification 、 Automatic policy enforcement , And automatically block the follow-up process function after risk identification , Realize containerization DevSecOps The process of .
Alibaba cloud container service escorts the upgrading of the original biochemical architecture of the enterprise cloud

边栏推荐
- 【TcaplusDB知识库】TcaplusDB单据受理-建表审批介绍
- Uniform Asymptotics by Alexei
- Institute of Microbiology, Chinese Academy of Sciences recruited 20 young PI, with a resettlement fee of 2million yuan and a start-up fund of 10million yuan (long-term effective)
- 【TcaplusDB知识库】TcaplusDB OMS业务人员权限介绍
- MQTT协议栈原理及交互流程图
- 旭日3SDB,安装原版ros
- Xuri 3sdb, installing the original ROS
- [tcapulusdb knowledge base] Introduction to tcapulusdb tcapsvrmgr tool (I)
- Leetcode 177 The nth highest salary (June 26, 2022)
- 0 basic understanding of how e-commerce systems connect with payment channels
猜你喜欢

Drive to APasS!使用明道云管理F1赛事

MQTT协议栈原理及交互流程图

政策关注 | 加快构建数据基础制度,维护国家数据安全

"Internet +" contest topic hot docking | I figure to understand 38 propositions of Baidu

Matlab exercises - create 50 rows and 50 columns of all zero matrix, all 1 matrix, identity matrix, diagonal matrix, and output the 135 element of the matrix.

Salesforce 容器化 ISV 场景下的软件供应链安全落地实践

15+城市道路要素分割应用,用这一个分割模型就够了!

L'utilisation de C language 0 length Array

【TcaplusDB知识库】TcaplusDB单据受理-建表审批介绍

QStyle类用法总结(三)
随机推荐
KDD 2022 | 基于分层图扩散学习的癫痫波预测
21: Chapter 3: develop pass service: 4: further improve [send SMS, interface]; (in [send SMS, interface], call Alibaba cloud SMS service and redis service; a design idea: basecontroller;)
QStyle实现自绘界面项目实战(一)
Deep learning in finance in cross sectional sectional predictions for random forests
Uniform Asymptotics by Alexei
机器学习系统在生产中的挑战
c/s 架构
R语言使用MASS包的polr函数构建有序多分类logistic回归模型、使用VGAM包的vglm函数对有序多分类logistic回归模型进行平行性假设作检验
杰理之DAC输出方式设置【篇】
【TcaplusDB知识库】Tmonitor系统升级介绍
Jerry added an input capture channel [chapter]
How to deploy jupyterlab in methodot?
【TcaplusDB知识库】TcaplusDB单据受理-创建业务介绍
防止被00后整顿?一公司招聘要求员工不能起诉公司
Jerry's DAC output mode setting [chapter]
Institute of Microbiology, Chinese Academy of Sciences recruited 20 young PI, with a resettlement fee of 2million yuan and a start-up fund of 10million yuan (long-term effective)
R语言使用epiDisplay包的dotplot函数通过点图的形式可视化不同区间数据点的频率、使用by参数指定分组参数可视化不同分组的点图分布、使用dot.col参数指定分组数据点的颜色
【TcaplusDB知识库】TcaplusDB表数据缓写介绍
Jerry's constant feeding of dogs will cause frequent switch interruptions leading to timer [chapter]
15+城市道路要素分割应用,用这一个分割模型就够了!