Docker Security conducts a security assessment of the software included in container images, provides detailed image security profiles and continuously monitor for vulnerabilities. The service provides notifications for integrated content security across the supply chain, according to Docker.
The tool is available today to Docker Cloud users with a private repo plan. The company plans to extend the service to include all Docker Cloud repo users by the end of Q3.
Pricing begins at $2 per repo as an add-on service for private repo plans. Docker Security Scanning will also be available as an integrated feature in Docker Datacenter during the second half of 2016.
“We’ve made it our goal to secure the global software supply chain from development, test to production,” said Nathan McCauley, director of security at Docker. “As with all of Docker’s tooling, Docker Security Scanning works as an integrated component without any disruption to developer productivity.”
The tool helps developers accelerate their workflows while providing greater visibility into the Docker images they choose to run in their environment, enabling IT operations to configure the security policies, he said.
Docker Security Scanning conducts binary level scanning, generating a detailed security profile for each Docker image. This includes details that allow IT operations to assess if the software meets its security compliance standards. According to the company, the tool works seamlessly with existing dev and IT workflows and scans every time a change is shipped, adding a checkpoint before deployment.
“The output data that we received from the Docker Security Scanning proved to be very valuable to us,” said Valentin Chartier, senior manager sf cloud Services at HomeByMe-3DVIA, a Dassault Systemes (3DS) company. “This tool is a very effective for reviewing our components and for building a security profile for the images within our scanned private repos.”
He said the images are scanned from the HomeByMe’s private repository and hosted within Docker Hub, “without having to make any changes to our existing process.”
Since the tool operates on a binary level, “we can trust that all the installed components are scanned,” according to Chartier.
SAMSUNG GALAXY S8 PLUS
The Samsung Galaxy S8 Plus is a beautifully crafted smartphone with nearly no bezel, curvaceous in design and reflects a…
How to: Connect to Exchange Online Using Multi-Factor Authentication
Using PowerShell to manage your Microsoft cloud services like Exchange Online and using multi-factor authentication (MFA) separately is awesome. Using…