contact@ijirct.org      

 

Publication Number

2410059

 

Page Numbers

1-16

Paper Details

Automated Container Image Security in CI/CD Pipelines

Authors

Yogeswara Reddy Avuthu

Abstract

Containerization has revolutionized software development, providing lightweight, scalable, and portable environments for running applications across platforms. However, with this shift comes the challenge of securing container images throughout the Continuous Integration and Continuous Deployment (CI/CD) pipeline. This paper presents a detailed analysis of automated security practices for container image security within CI/CD pipelines.
We explore the integration of vulnerability scanners, digital signing, and policy enforcement tools that enhance security checks from image creation to deployment. The study investigates various tools and their role in automating the detection of vulnerabilities, ensuring image integrity, and maintaining compliance with organizational security standards. The research further addresses the significance of continuous monitoring and runtime security post-deployment, safeguarding containers from evolving threats.
Moreover, the paper identifies key challenges, including false positives in vulnerability scans and the complexity of managing multiple security integrations. A detailed evaluation of runtime monitoring tools, such as Falco, demonstrates their efficacy in detecting anomalies in container behavior. Future directions for enhancing automated security in containerized environments are also discussed, focusing on improving tool integration and adapting to the dynamic nature of cloud-native applications.

Keywords

Container security, CI/CD pipelines, vulnerability scanning, digital signing, policy enforcement, runtime security, DevOps, cloud security.

 

. . .

Citation

Automated Container Image Security in CI/CD Pipelines. Yogeswara Reddy Avuthu. 2018. IJIRCT, Volume 4, Issue 1. Pages 1-16. https://www.ijirct.org/viewPaper.php?paperId=2410059

Download/View Paper

 

Download/View Count

2

 

Share This Article