UPDATED 09:01 EDT / NOVEMBER 16 2015

NEWS

Docker gets a lot more secure with user namespaces and new image controls

Hackers will soon have a much harder time breaking into container clusters thanks to new security functionality Docker Inc. is introducing at its second annual European user conference this morning that promises to block off two key threat vectors. The first is its official third party software catalog, which curates operating system images, databases, and other application staples for easy access. None of the carefully-vetted entries in the gallery is particularly likely to contain malware, but there is always the risk of a bug or vulnerability accidentally slipping through.

The tens of thousands of developers that rely on the Docker Hub can thus unknowingly end up implementing compromised software in their projects with the potential to open a window for attacks. The new verification feature rolling out for the service promises to avoid such situations by periodically checking entries against the Department of Homeland Security’s continuously updated public vulnerability database and putting up a warning when a match is found. That kills two birds with one stone, deterring users against downloading unsafe software and thus giving vendors a strong incentive to issue a fix as soon as possible.

The addition should come particularly handy for organizations using Docker in production that have until now had to look out for new exploit warnings by themselves. The issue came on top of the already daunting task of securing the software produced internally, a challenge that the startup is also addressing at the conference with the introduction of support for Yubico Inc.’s namesake USB authentication drives. Developers are now able to use their company-issued Yubikeys to sign every new piece of code with a digital seal that be rechecked before it’s rolled out to production in order to ensure that it hasn’t been tampered with.

When implemented properly, that arrangement can make it immensely difficult to compromise an environment without physical access. But even if a hacker somehow gets their hands on a key and then manages to bypass all the other mechanisms guarding an organization’s Docker deployment, they’ll still have get past the third new security feature that is debuting at the conference: Support for the user namespaces in the Linux kernel, which make it possible to use advanced operating system functions inside a container without affecting the others running on the same server.

The functionality severely limits the potential damage that can be caused by a breach, bringing Docker much closer to the level of security offered by traditional hypervisors like VMware Inc.’s ESXI that simply include a dedicated OS image in every instance. At the end of the day, however, all of the containers on a given host still have to share the same kernel. As a result, there’s still much more work to be done until Docker becomes a viable alternative to conventional virtualization for everyday enterprises.

Image via Huskyherz

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU