{"id":664,"date":"2021-07-23T06:46:56","date_gmt":"2021-07-23T06:46:56","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=664"},"modified":"2021-07-23T06:46:56","modified_gmt":"2021-07-23T06:46:56","slug":"survey-97-of-respondents-unaware-of-critical-container-security-principles","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/","title":{"rendered":"Survey: 97% of respondents unaware of critical container security principles"},"content":{"rendered":"<p>Aqua Security on Thursday released a report which found that only 3% of respondents surveyed recognize that a container \u2013 in and of itself \u2013 does not function as a security boundary, indicating that 97% are unaware of basic container security principles, often overestimating the default security properties of\u00a0<a href=\"https:\/\/www.scmagazine.com\/news\/application-security\/kubernetes-clusters-attacked-via-misconfigured-argo-workflow-instances\">containers.<\/a><\/p>\n<p>Amir Jerbi, co-founder and CTO at Aqua, added that security teams should find the number alarming combined with other\u00a0<a href=\"https:\/\/www.aquasec.com\/news\/cloud-native-runtime-security-survey\/\">survey<\/a>\u00a0data that found only 24% of respondents have plans to deploy the necessary building blocks for runtime security.<\/p>\n<p>&#8220;The survey results showcase a staggering knowledge gap that leads to an underinvestment in a critical part of full lifecycle, end-to-end security for cloud native applications,\u201d Jerbi said. \u201cThe default security capabilities of containers and cloud native controls are complex, with multiple layers that might not overlap between orchestrators and containers. With this complexity, practitioners might overestimate the default security. It takes a double-click further down to understand the full implications of the security controls available, and what other controls might be needed to combat the kind of sophisticated attacks we see.\u201d<\/p>\n<p>For example, the survey found that only 18% realize they are at risk for zero-days in containerized environments. And while 32% were confident in overall holistic runtime security protection, less than 23% had the necessary building blocks of runtime security in place.<\/p>\n<p>The Aqua Security report clearly shows the importance of network-based ingress and egress security for container clusters, said Vishal Jain, co-founder and CTO at Valtix. \u00a0\u201cA layered defense approach is critical,\u201d Jain said. \u201cThat\u2019s why it\u2019s important to deploy network-based ingress and egress controls for container clusters to look for suspicious activity from nodes with compromised containers.<\/p>\n<p>Michael Isbitski, technical evangelist at Salt Security, added that he\u2019s spent many days as an analyst explaining the pros and cons of native container security versus third-party container security offerings from vendors like Aqua and Stackrox.<\/p>\n<p>\u201cSituations with container security also get worse than what the survey highlights,\u201d Isbitski said. \u201cPractitioners sometimes misunderstand the application security and API security benefits of container security, whether it is from native container runtime features or third-party add-ons. Container security tooling focuses heavily on securing container images, container workloads, and container platforms. Application-layer and API security are still largely out of scope for container security.\u201d<\/p>\n<p>Source:<\/p>\n<p><a href=\"https:\/\/www.scmagazine.com\/news\/cloud-security\/survey-97-of-respondents-unaware-of-critical-container-security-principles\">Read the Full Story Here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aqua Security on Thursday released a report which found that only 3% of respondents surveyed recognize that a container \u2013 in and of itself \u2013 does not function as a security boundary, indicating that 97% are unaware of basic container security principles, often overestimating the default security properties of\u00a0containers. Amir Jerbi, co-founder and CTO at [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":251,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-664","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Survey: 97% of respondents unaware of critical container security principles - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Survey: 97% of respondents unaware of critical container security principles - Community\" \/>\n<meta property=\"og:description\" content=\"Aqua Security on Thursday released a report which found that only 3% of respondents surveyed recognize that a container \u2013 in and of itself \u2013 does not function as a security boundary, indicating that 97% are unaware of basic container security principles, often overestimating the default security properties of\u00a0containers. Amir Jerbi, co-founder and CTO at [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-23T06:46:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/adult-books-business-coffee-374016.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/\",\"name\":\"Survey: 97% of respondents unaware of critical container security principles - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/adult-books-business-coffee-374016.jpg\",\"datePublished\":\"2021-07-23T06:46:56+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/adult-books-business-coffee-374016.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/adult-books-business-coffee-374016.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Survey: 97% of respondents unaware of critical container security principles\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Survey: 97% of respondents unaware of critical container security principles - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/","og_locale":"en_US","og_type":"article","og_title":"Survey: 97% of respondents unaware of critical container security principles - Community","og_description":"Aqua Security on Thursday released a report which found that only 3% of respondents surveyed recognize that a container \u2013 in and of itself \u2013 does not function as a security boundary, indicating that 97% are unaware of basic container security principles, often overestimating the default security properties of\u00a0containers. Amir Jerbi, co-founder and CTO at [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2021-07-23T06:46:56+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/adult-books-business-coffee-374016.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/","name":"Survey: 97% of respondents unaware of critical container security principles - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/adult-books-business-coffee-374016.jpg","datePublished":"2021-07-23T06:46:56+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/adult-books-business-coffee-374016.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/adult-books-business-coffee-374016.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/survey-97-of-respondents-unaware-of-critical-container-security-principles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Survey: 97% of respondents unaware of critical container security principles"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=664"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/664\/revisions"}],"predecessor-version":[{"id":665,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/664\/revisions\/665"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/251"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}