What's really inside your docker containers?

What's really inside your docker containers?

Dreams of Code

1 год назад

19,872 Просмотров

See NordPass Business in action now with a 3-month free trial here
https://nordpass.com/dreamsofcode with code dreamsofcode

Containers have changed the way we deploy for the better, but there's a hidden cost to the benefit that they bring. An increase in the number of vulnerabilities.

In this video, we explore that cost and how you can protect yourself from it by introducing two new tools, Syft and Grype, which provide container scanning for Docker and other container images.

This video includes a paid sponsorship for NordPass Business

Join this channel to get access to perks:
https://www.youtube.com/channel/UCWQaM7SpSECp9FELz-cHzuQ/join

My socials:
Twitter: https://twitter.com/dreamsofcode_io
Discord Server: https://discord.gg/eMjRTvscyt

Links:
Syft: https://github.com/anchore/syft
Grype: https://github.com/anchore/grype
Code: https://github.com/dreamsofcode-io/container-scanning
Docker Image: ghcr.io/dreamsofcode-io/gotainer:1.0

#docker #security #vulnerability

00:00 Intro
01:59 Syft
05:16 Sponsor
06:30 Grype
11:02 Conclusion
11:30 Member shoutouts

Тэги:

#docker #containers #images #scanning #vulns #vuln #vulerabilities #exploits #ethical_hacking #protection #go #golang #coding #software #development #infosec #opsec
Ссылки и html тэги не поддерживаются


Комментарии:

@JonBrookes
@JonBrookes - 14.09.2023 14:23

very usefull and thank you for making this video

I am happy to see some of my images that run go apps have zero vulnerabilities according to grype where as others that use bigger, lets say more feature rich base images not so, er, well, some vulnerabilities there then, ahem.

So there is a lot to be said for small containers running go, rust, ( insert here other compiled and perhaps statically compiled ) that use base images that are as minimal as possible if you want them to 'stay young and beautiful'.

Ответить
@B20C0
@B20C0 - 03.09.2023 12:04

This video should be on the watch list of every DevSecOps engineer, good job!

Ответить
@adam_pech
@adam_pech - 01.09.2023 17:36

Hello @dreamsofcode this is already new feature in Docker under function Docker Scout, am I right?

Ответить
@DrMarcB
@DrMarcB - 01.09.2023 15:23

Thank you. Would definitely like to see how to integrate with CI/CD

Ответить
@anotherone2398
@anotherone2398 - 30.08.2023 04:40

It'd be really cool if you could dive deep into how containers work under the hood

Ответить
@BD-hx9lf
@BD-hx9lf - 06.08.2023 21:14

which DE are you using ?

Ответить
@OleksaBaida
@OleksaBaida - 19.07.2023 16:58

Is there any pros of using snyft+grype against snyk or trivy, for example?

Ответить
@alexsoul982
@alexsoul982 - 11.07.2023 18:33

Great video, I recently discover your channel and I've learn a lot from you.. May I ask you, what zsh theme are you using? Greatings from Cuba 💪🏼

Ответить
@Billiegoose
@Billiegoose - 08.07.2023 20:12

This is incredibly well made! Graphics, script, everything!

Ответить
@nekretaur
@nekretaur - 30.06.2023 20:53

C++ Neovim with clangd pls!

Ответить
@ardavanizadiyar
@ardavanizadiyar - 28.06.2023 19:59

But these issues weren't about the docker rather the OS or software that being used. Also, using docker, opens up the opportunity to scan the OS, which it wasn't the case back in the day we just trust the server provider's OS without even scanning or ability to modify it as easy as docker Images.

thanks for sharing the scanning tools though.

Ответить
@marcuswest8085
@marcuswest8085 - 27.06.2023 13:49

Are you thinking of creating a container with your setup in it?

Ответить
@agcodes
@agcodes - 26.06.2023 15:50

what desktop environment do you use ? (I know arch btw, whats the de)

Ответить
@AdeaduraAdegbite
@AdeaduraAdegbite - 23.06.2023 14:34

But i don't know why

Ответить
@VitorDonnangeloCardoso
@VitorDonnangeloCardoso - 23.06.2023 03:34

I love you man

Ответить
@JohnSmith-yz7uh
@JohnSmith-yz7uh - 22.06.2023 21:47

Is this more applicable to container maintainers or to admins deploying a container? You should vet containers you're going to deploy, but having to update dependencies/packages yourself before deploying seems too much. Even though I just started working professionally, I prefere setting up VMs and applications up from scratch. Repos for newer versions etc. in hindsight it might be just as much work

Ответить
@mizunokizu
@mizunokizu - 22.06.2023 16:30

Would have been cool to include Dive and anything similar to that in this also

Ответить
@hades_2.042
@hades_2.042 - 22.06.2023 14:29

When video about Arch ?

Ответить
@victorguidi6223
@victorguidi6223 - 22.06.2023 13:55

Fantastic video!! Would be awesome to see a continuation on how to integrate that within a deployment process! Thanks a lot for the content 💪🏼

Ответить
@abombfuenmayor
@abombfuenmayor - 22.06.2023 07:45

Awesome video. Thank you!

Ответить
@waldowalden7379
@waldowalden7379 - 22.06.2023 06:45

Another great video. On top of that I'd add I am observed variations in container scanner results. Remember that scanners are based on database of vulnerabilities and some of them update more frequent than others, or simple, has a different logic when scanning. Having said that I'd encourage pick the top 3 free scanners out there (Trivy, Grype, Snyk) and double check your scanning results. (you can build a Python script to consolidate the scanning and even build into a pipeline).

The reason why these discrepancies are common relies in the fact how scanners logic runs. I've been found earlier that Snyk doesn't work well with stripped binaries on containers (for instance, when the container builder decided to remove some metadata of the container in order to make it reduce the size of the image).

@Dreams of Code ... awesome material ... I'd improve this video in the future using Trivy instead Grype since Trivy scans secrets along with the process of containers scanning. =)

Ответить
@allroni
@allroni - 22.06.2023 04:18

Thanks a lot, once again! I really love your introductions to different tools! And your animations are amazing, as always!
Personally, I find that the short sound effects you added detract a bit from what you are saying and I'm glad you didn't use them as much after the intro. (Just wanted to let you know in case you plan to add them to the rest of the video as well... but then again, perhaps it's just me. :-)

Ответить
@sergioromano116
@sergioromano116 - 21.06.2023 23:35

Thanks for this video. I need to scan my containers 😅

Ответить
@orbital1337
@orbital1337 - 21.06.2023 21:33

Yup, this is not surprising to me at all. This is what happens when you take the responsibility of updating core OS components, libraries, and other parts of the environment away from the distro maintainers and sysadmins who are quite security conscious, and give that responsibility to the application developers who are not. The developers would rather just use something that they know works instead of updating.

Software packaging is an unsolved problem - perhaps an unsolvable problem. Whenever people tell you that containers are the be-all and end-all of software packaging, remember that there is no such thing, only trade-offs.

Ответить
@LoganVanCuren
@LoganVanCuren - 21.06.2023 20:48

Fantastic video! Thank you! It is very eye opening to scan through my images!

Ответить
@Ashaiksameer
@Ashaiksameer - 21.06.2023 19:06

Hey my eyes are paining😢 when was java configuration is coming😢😢please atleast tell me the date..

😢😢reply😢

Ответить
@user-fh8zj5sm6v
@user-fh8zj5sm6v - 21.06.2023 18:57

My containers are completely 100% safe
- Me, 2023, running a couple of containers in --privileged mode

Ответить
@jayjay7333
@jayjay7333 - 21.06.2023 18:31

Amazing video

Ответить
@mabusugaming
@mabusugaming - 21.06.2023 18:25

I want your wallpaper

Ответить
@navaneeth6157
@navaneeth6157 - 21.06.2023 17:40

❤high quality videos as always

Ответить
@venkatrushivanga1025
@venkatrushivanga1025 - 21.06.2023 17:32

Which Desktop Environment you use on arch ?

Ответить
@cheako91155
@cheako91155 - 21.06.2023 17:31

Just upgrading to the latest version brings in new features that must add new vulnerabilities. This is like sticking your head in the sand and then claiming you are now far away from the beach.

Ответить
@darkfire2703
@darkfire2703 - 21.06.2023 16:01

Very nice video.

But to play devils advocate here: "An image has components with vulnerabilities" is not the same as "An image is exploitable". Many of the vulnerabilities, even those categorized as HIGH, are not exploitable in practice. So while the 87% sound very very bad, it does in no way mean that 87% of the images can actually be exploited in the field if they are deployed. (Assuming that the 87% is just counting images that have components with vulnerabilities.)

This of course doesn't mean we should just ignore vulnerabilities. The scanners are very useful and should probably be used by pretty much anyone. I'm just saying that things are often not as bad in practice

Ответить
@blaze9872
@blaze9872 - 21.06.2023 15:27

Fantastic video! Waiting on the video with build automation!

Ответить
@yaaaayeet745
@yaaaayeet745 - 21.06.2023 14:57

THE THUMBNAIL IS JUST 🤌✨

Ответить
@antonioiorga7708
@antonioiorga7708 - 21.06.2023 14:54

Each time I see one of your videos I try to make my terminal closer to yours. 😂😂
The bar of the bottom of the terminal is an ohmyzsh plugin?

Ответить
@FauzulChowdhury
@FauzulChowdhury - 21.06.2023 14:52

This is the way 🦾

Ответить
@mantovani96
@mantovani96 - 21.06.2023 14:49

Man, your videos are so good!

Ответить
@dylanelens
@dylanelens - 21.06.2023 14:41

Good video, I really liked the topic. I use docker all the time and did not know this was that much of an issue

Ответить
@frann8487
@frann8487 - 21.06.2023 14:23

I really like the way your videos are made but the topic was not that interesting

Ответить