Analysis of Security in Modern Container Platforms




Lauren Samuel, Memarian Mohammed Reza, Conti Mauro, Leppänen Ville

Sanjay Chaudhary, ‎Gaurav Somani, ‎Rajkumar Buyya

2017

Research Advances in Cloud Computing

351

369

978-981-10-5025-1

978-981-10-5026-8

DOIhttps://doi.org/10.1007/978-981-10-5026-8_14

https://link.springer.com/content/pdf/10.1007/978-981-10-5026-8_14.pdf



Containers have quickly become a popular alternative to more traditional
virtualizationmethods such as hypervisor-based virtualization. Residing at operating
system level, containers offer a solution that is cheap in terms of resource usage and
flexible in the way it can be applied. The purpose of this chapter is two-fold: first,
we provide a brief overview of available container security solutions and how they
operate, and second, we try to further elaborate and asses the security requirements
for containers as proposed by Reshetova et al. We take a look at the current and
past security threats and Common Vulnerabilities and Exposures (CVE) faced by
container systems and see how attacks that exploit them violate the aforementioned
requirements. Based on our analysis, we contribute by identifying more security
requirements for container systems.



Last updated on 2024-26-11 at 11:34