フィードを購読する
If you’re like most organizations, you have a great deal of policies, processes, and resources in place to control what technology gets introduced into your infrastructure. You rely on these checks and balances to mitigate risks.

 

What you might not know is that while containers can dramatically accelerate your ability to deliver applications, it also introduces many risks if you do not follow recommended practices. For example, Trevor Jay with the Red Hat Product Security Team observes:

 

“Docker brings with it an entirely new attack surface in the form of its automated fetching and installation mechanism, ‘docker pull.’ It may be counter-intuitive, but ‘docker pull’ both fetches and unpacks a container image in one step.”

 

Consider the example of a file attached to an email. While email attachments are a popular and convenient way to send documents and other files, they are also a common source of viruses and malware. You use caution when opening attachments, even if they appear to have been sent by someone you know, and this same caution should be taken when unpacking container images. Unfortunately, “docker pull” does not allow you to separate receiving the image from unpacking it, in the way that email does.

 

In addition to introducing many unknown suppliers of container images as building blocks into your infrastructure, it is possible that mistyping an image name during a “docker pull” can lead to system compromises through malicious code.

 

For this reason, Red Hat recommends that you protect your infrastructure when using Docker images by:

  1. Making sure to only use content from trusted sources (which you should be doing anyway, regardless of whether it involves containers or not).

  2. Separating the download and unpack/installation steps when working with container images.

 

You also need to be sure that the container images you include in your infrastructure are safe to consume and certified to run wherever you choose to deploy them – whether on premise to physical hardware, virtually, private cloud, or public cloud.

 

At Red Hat, we’re working to advance both container technology and the supporting ecosystem to make Linux containers enterprise-consumable, much as we did with Linux. Red Hat is currently developing containerization solutions to offer the advantages of:

 

  • Trusted access to digitally signed container images that are certified to run on certified container hosts.

  • An integrated application delivery platform from application container to deployment target built on open standards.

  • Proven container portability with deployment across physical hardware, hypervisors, private clouds, and public clouds.

Whether an application is deployed to a physical server, a virtual machine, a public cloud instance or a Linux container, IT teams must have confidence that their infrastructure, systems, and critical data will remain secure and uncompromised. Regardless of innovation, enterprises need the same level of security, reliability and trust of any “traditional” application – and containers are no exception.

 

Image credit: opensource.com


執筆者紹介

Red Hat is the world’s leading provider of enterprise open source software solutions, using a community-powered approach to deliver reliable and high-performing Linux, hybrid cloud, container, and Kubernetes technologies.


Red Hat helps customers integrate new and existing IT applications, develop cloud-native applications, standardize on our industry-leading operating system, and automate, secure, and manage complex environments. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. As a strategic partner to cloud providers, system integrators, application vendors, customers, and open source communities, Red Hat can help organizations prepare for the digital future.

Read full bio
UI_Icon-Red_Hat-Close-A-Black-RGB

チャンネル別に見る

automation icon

自動化

テクノロジー、チームおよび環境に関する IT 自動化の最新情報

AI icon

AI (人工知能)

お客様が AI ワークロードをどこでも自由に実行することを可能にするプラットフォームについてのアップデート

open hybrid cloud icon

オープン・ハイブリッドクラウド

ハイブリッドクラウドで柔軟に未来を築く方法をご確認ください。

security icon

セキュリティ

環境やテクノロジー全体に及ぶリスクを軽減する方法に関する最新情報

edge icon

エッジコンピューティング

エッジでの運用を単純化するプラットフォームのアップデート

Infrastructure icon

インフラストラクチャ

世界有数のエンタープライズ向け Linux プラットフォームの最新情報

application development icon

アプリケーション

アプリケーションの最も困難な課題に対する Red Hat ソリューションの詳細

Original series icon

オリジナル番組

エンタープライズ向けテクノロジーのメーカーやリーダーによるストーリー