Report: 75% of containers found to be operating with severe vulnerabilities
source link: https://venturebeat.com/2022/01/28/report-75-of-containers-found-to-be-operating-with-severe-vulnerabilities/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
Report: 75% of containers found to be operating with severe vulnerabilities
Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream.
A new report by Sysdig reveals that as teams rush to expand, container security and usage best practices are sacrificed, leaving openings for attackers. In addition, operational controls lag, potentially resulting in hundreds of thousands of dollars being wasted on poor capacity planning. All of these are indicators that cloud and container adoption is maturing beyond early, “expert” adopters, but moving quickly with an inexperienced team can increase risk and cost.
One of the most shocking findings is that 75% of containers have “high” or “critical” patchable vulnerabilities. Organizations take educated risks for the sake of moving quickly; however, 85% of images that run in production contain at least one patchable vulnerability. Furthermore, 75% of images contain patchable vulnerabilities of “high” or “critical” severity. This implies a fairly significant level of risk acceptance, which is not unusual for high agility operating models, but can be very dangerous.
The analysis also revealed that 73% of cloud accounts contain exposed S3 buckets and 36% of all existing S3 buckets are open to public access. The amount of risk associated with an open bucket varies according to the sensitivity of the data stored there. However, leaving buckets open is rarely necessary and it’s usually a shortcut that cloud teams should avoid.
Similarly, Sysdig also found that 27% of users have unnecessary root access – most without MFA enabled. Cloud security best practices and the CIS Benchmark for AWS indicate that organizations should avoid using the root user for administrative and daily tasks, yet 27% of organizations continue to do so. Forty-eight percent of customers don’t have multifactor authentication (MFA) enabled on these highly privileged accounts, which makes it easier for attackers to compromise the organization if the account credentials are leaked or stolen.
The report also digs into the amount of money being wasted on poor capacity planning, the ratio of human to non-humans in the cloud, container lifespan and density data, along with open source project adoption.
Read the full report by Sysdig.
VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn More
Recommend
-
57
LinuxKit LinuxKit, a toolkit for building custom minimal, immutable Linux distributions. Secure defaults without compromising usability Everything is replaceable and customisable Immutable infrastructure app...
-
35
7 best practices for operating containers...
-
10
Product Description The Zyxel Cloud CNM SecuManager is a comprehensive network management software that provides an integrated console to monitor and manage security gateways including the ZyWALL USG and VPN Seri...
-
21
Bottlerocket is a Linux-based open-source operating system that is purpose-built by Amazon Web Services for running containers on virtual machines or bare metal hosts. Most customers today run containerized applications on gene...
-
14
Bottlerocket OS Welcome to Bottlerocket! Bottlerocket is a free and open-source Linux-based operating system meant for hosting containers. Bottlerocket is currently in a developer preview phase and we’re...
-
6
How I was hacking docker containers by exploiting ImageMagick vulnerabilities
-
4
Even though the TCC can prevent encryption during a ransomware attack, it still has some flaws that hackers can exploit Wojciech Ragula from SecureRing and Csaba Fitzl from Offensive Security, revea...
-
6
New NicheStack Critical Security Flaws Have Been Discovered Security researchers at Forescout rece...
-
1
Google’s Project Zero team discovered severe 0-day vulnerabilities with the Samsung Exynos modems used on the Pixel 6 and 7,...
-
3
What you need to knowUsers on Reddit have started reporting battery drain problems with the Pixel 7 and Pixel 6 series.Overheating has also become a problem after downloading the June 2023 securi...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK