Draft NISTIR 8176, Security Assurance Requirements for Linux Application Container Deployments

نویسنده

  • Ramaswamy Chandramouli
چکیده

80 Application Containers are slowly finding adoption in enterprise IT infrastructures. Security 81 guidelines and countermeasures have been proposed to address security concerns associated with 82 the deployment of application container platforms. To assess the effectiveness of the security 83 solutions implemented based on these recommendations, it is necessary to analyze them and 84 outline the security assurance requirements they must satisfy to meet their intended objectives. 85 This is the contribution of this document. The focus is on application containers on a Linux 86 platform. 87

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Title : Security Assurance Requirements for Linux Application

80 Application Containers are slowly finding adoption in enterprise IT infrastructures. Security 81 guidelines and countermeasures have been proposed to address security concerns associated with 82 the deployment of application container platforms. To assess the effectiveness of the security 83 solutions implemented based on these recommendations, it is necessary to analyze them and 84 outline ...

متن کامل

Smart Brix - a continuous evolution framework for container application deployments

Container-based application deployments have received significant attention in recent years. Operating system virtualization based on containers as a mechanism to deploy and manage complex, large-scale software systems has become a popular mechanism for application deployment and operation. Packaging application components into selfcontained artifacts has brought substantial flexibility to deve...

متن کامل

DRAFT NISTIR 8080, Usability and Security Considerations for Public Safety Mobile Authentication, NISTIR 8080, usaability, Public Safety Mobile Authentication, authentication, identity management, local authentication, public safety, remote authentication, usable security

82 There is a need for cybersecurity capabilities and features to protect the Nationwide Public 83 Safety Broadband Network (NPSBN). However, cybersecurity requirements should not 84 compromise the ability of first responders to complete their missions. In addition, the diversity of 85 public safety disciplines means that one solution may not meet the usability needs of different 86 disciplines...

متن کامل

HPC Containers in Use

Linux containers in the commercial world are changing the landscape for application development and deployments. Container technologies are also making inroads into HPC environments, as exemplified by NERSC’s Shifter and LBL’s Singularity. While the first generation of HPC containers offers some of the same benefits as the existing open container frameworks, like CoreOS or Docker, they do not a...

متن کامل

Container Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments

The unique and intrinsic methods by which Linux application containers are created, deployed, networked, and operated do not lend themselves well to the conventional application of methods for conducting intrusion detection and analysis in traditional physical and virtual machine networks. While similarities exist in some of the methods used to perform intrusion detection and analysis in conven...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017