In light of the recent Equifax breach, Gene Kim and speakers from the upcoming DevOps Enterprise Summit San Francisco (DOES17) dissected the situation and discussed the technical leadership lessons learned while offering their own expert advice for handling crisis situations. The following are more highlights from the discussion ...
Tripwire announced that Tripwire IP360 now scans for vulnerabilities on non-running Docker containers.
This expansion builds upon Tripwire’s existing ability to scan running containers, making Tripwire IP360 truly integrated with advanced container scanning capabilities. This release provides security teams with visibility into DevOps processes.
Tripwire IP360 now allows customers to scan online, offline and non-running containers for vulnerabilities, giving them an enhanced overall view and lowering the chance that vulnerabilities will slip through the cracks during the development stage and into production. This new feature offers stronger security for DevOps processes, whether on-premise or in the cloud.
“Containers, which are lightweight self-contained virtual images designed to execute specific tasks or applications repeatedly and reliably, are often switched from non-running to running and vice versa as they are needed. It’s important to scan containers for vulnerabilities no matter what state they are in and to do so regularly because they can be updated often, even in production,” said Lamar Bailey, Senior Director of Engineering at Tripwire. “Tripwire IP360 now makes it possible to quickly and reliably scan all Docker containers, whether running or not, which is necessary to reduce the risk of a security breach.”
DevOps teams’ increasing use of containers to accelerate software development and deployment has added complexity for security teams.
Bailey added: “Enterprise IT security executives are responsible for actively and continuously reducing security risk to their businesses, which means assessing all of the components on their networks for vulnerabilities. Containers are no exception, so it’s important to have thorough vulnerability assessment tools for these as well.”