
Which of the following best aligns with the security principles of containerization? (Wentz QOTD)
A. Overlay networks are commonly used to monitor traffic between nodes.
B. Containers shall be deployed on the same host to impose the security baseline.
C. Containers are stateless and immutable, against which in-place patches are not allowed.
D. General-purpose OSs are more flexible and suitable for reducing attack surfaces of containers.
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
My suggested answer is C. Containers are stateless and immutable, against which in-place patches are not allowed.

A container image is a package created and registered by developers that contains all the files, typically organized in layers, required to run in a container. An image typically comprises layers, such as the minimum OS core (aka base layer), application frameworks, and custom code.
Even though a host could directly contact a registry for an image and deploy it into a container, orchestrators such as Kubernetes (K8S), Docker Swarm, Mesos, etc., can automate the deployment process to pull images from registries, deploy them into containers, and manage the container runtimes.
Immutability and Elasticity
As the chickens of the pets, cattle, chickens, and insects analogy, containers are deployed for elasticity, a capability to automatically “scale out and scale in” and “scale up and scale down.”
We take good care of our pets but kill and eat animals like cattle and chickens without regrets. VMs and containers are workloads that can be destroyed, replaced, and added at our discretion anytime. Immutability and stateless are two critical properties for containers to implement elasticity.
Immutability means “unchanging over time or unable to be changed.” (Google) We can think of a container as read-only; the only way to update a container is to replace it with a new one. Stateless means a container won’t retain data in its local storage; however, a remote repository is used to persist and share states across containers.
Most application container technologies implement the concept of immutability. In other words, the containers themselves should be operated as stateless entities that are deployed but not changed. When a running container needs to be upgraded or have its contents changed, it is simply destroyed and replaced with a new container that has the updates.
Source: NIST SP 800-192
Overlay Networks
Overlay networks are commonly used to isolate traffic between nodes. On the contrary, it may result in difficulties for non-container-aware defense tools to monitor traffic.
Segmenting and Grouping Containers
It’s suitable to group containers with the same purpose, sensitivity, and threat posture on a single host in some circumstances. Still, it doesn’t apply to all containers that don’t share the same security requirements.
Only group containers with the same purpose, sensitivity, and threat posture on a single host OS kernel to allow for additional defense in depth.
Segmenting containers by purpose, sensitivity, and threat posture provides additional defense in depth. This segmentation may be provided by using multiple physical servers, but modern hypervisors also provide strong enough isolation to effectively mitigate these risks.
Source: NIST SP 800-192
NIST Application Container Security Guide
NIST recommends organizations should follow these recommendations to help ensure the security of their container technology implementations and usage:
- Tailor the organization’s operational culture and technical processes to support the new way of developing, running, and supporting applications made possible by containers.
- Use container-specific host OSs instead of general-purpose ones to reduce attack surfaces.
- Only group containers with the same purpose, sensitivity, and threat posture on a single host OS kernel to allow for additional defense in depth.
- Adopt container-specific vulnerability management tools and processes for images to prevent compromises.
- Consider using hardware-based countermeasures to provide a basis for trusted computing.
- Use container-aware runtime defense tools.
Reference
- What Is Container Security?
- NIST SP 800-192 (Application Container Security Guide)
- Guide to Container Security – Everything You Need to Know
- The pets and cattle analogy demonstrates how serverless fits into the software infrastructure landscape
- The History of Pets vs Cattle and How to Use the Analogy Properly
- Elasticity
- Automating Elasticity
A BLUEPRINT FOR YOUR SUCCESS IN CISSP
My new book, The Effective CISSP: Security and Risk Management, helps CISSP aspirants build a solid conceptual security model. It is not only a tutorial for information security but also a study guide for the CISSP exam and an informative reference for security professionals.
- It is available on Amazon.
- Readers from countries or regions not supported by Amazon can get your copy from the author’s web site.
以下哪一項最符合容器化(containerization)的安全原則?(Wentz QOTD)
A. 覆蓋網絡(overlay network)通常用於監視節點(nodes)之間的流量。
B. 容器(container)應部置在同一主機上以強加安全基準(baseline)。
C. 容器是無狀態且不可變(immutable)的,因此不允許就地修補(patch)容器。
D. 通用(general-purpose)操作系統較有彈性活,適合降低容器的受攻擊面(attack surfaces)。
Pingback: 容器化的安全原則(the security principles of containerization) – Choson資安大小事