Paper Details
Automated Container Image Security in CI/CD Pipelines
Authors
Yogeswara Reddy Avuthu
Abstract
Containerization has revolutionized software development, providing lightweight, scalable, and portable environments for running applications across platforms. However, with this shift comes the challenge of securing container images throughout the Continuous Integration and Continuous Deployment (CI/CD) pipeline. This paper presents a detailed analysis of automated security practices for container image security within CI/CD pipelines.
We explore the integration of vulnerability scanners, digital signing, and policy enforcement tools that enhance security checks from image creation to deployment. The study investigates various tools and their role in automating the detection of vulnerabilities, ensuring image integrity, and maintaining compliance with organizational security standards. The research further addresses the significance of continuous monitoring and runtime security post-deployment, safeguarding containers from evolving threats.
Moreover, the paper identifies key challenges, including false positives in vulnerability scans and the complexity of managing multiple security integrations. A detailed evaluation of runtime monitoring tools, such as Falco, demonstrates their efficacy in detecting anomalies in container behavior. Future directions for enhancing automated security in containerized environments are also discussed, focusing on improving tool integration and adapting to the dynamic nature of cloud-native applications.
Keywords
Container security, CI/CD pipelines, vulnerability scanning, digital signing, policy enforcement, runtime security, DevOps, cloud security.
Citation
Automated Container Image Security in CI/CD Pipelines. Yogeswara Reddy Avuthu. 2018. IJIRCT, Volume 4, Issue 1. Pages 1-16. https://www.ijirct.org/viewPaper.php?paperId=2410059