Securely Scale Container Utilization in Production with Chef.
Without proper image management and configuration it can be difficult to determine what is running in a live container and who has access to it.
Without knowing what is running in a container it is more difficult to audit and remediate containers thus increasing risks.
A lack of version control can also increase the probability of out of date images with known vulnerabilities being redeployed.
Chef has deep experience in the distributed systems management space. We’ve created a set of solutions designed specifically to address issues large complex organizations face as they scale the use of containers in production.
Isolate dependencies and create a minimal build artifact from scratch that is easily inspected and audited.
Validate the container build process, package version, functional requirements and underlying configurations.
Automate security testing across all stages and block unauthorized access and artifacts.
Lifting and shifting an existing application with all of its “baggage” into the container world creates bloated containers that are hard to manage and audit. Applications architected using microservices deployed via containers create a web of dependency mapping, version management and user permission challenges. Chef addresses these challenges with Chef Habitat which takes a shift-left approach to application definition and packaging that works for all applications regardless of the underlying technology.
Key features of the Chef approach to building and supporting containers include:
Chef can inspect a Docker container via the Docker API. This provides the ability to make assertions about a live, running container without requiring any changes to the container's contents or build process. Dashboards and reports are included in Chef Automate and enable compliance teams to see the status of systems across environments in real-time.
Common security violations that can be detected by Chef InSpec include:
Chef provided content for auditing Docker containers is directly aligned to CIS (Center for Internet Security) benchmarks. This minimizes the time and effort needed to audit Docker containers. Chef Compliance for Docker features standards-based audit and remediation content, easily tuned baselines to adapt to an organization’s needs, and visibility and control across hybrid and multi-cloud environments.
Directly publish optimized packages to ACR using a native integration and streamline automated pipeline delivery.
Eliminate the need to build external services and add dependencies in ECS and reduce operational complexity.
Easily build, deploy, and orchestrate Docker containers into GCR and GKE without rewriting or refactoring applications.
Scaling the use of containers in production requires organizations to rethink the way they package, deliver and audit applications. By proactively addressing the questions below DevSecOps teams can help their organizations mitigate the risks of containers and accelerate adoption.
Unsure of the answers? Our experts are here to help!
“We can push a button and have a completely new VPC, with new application stacks, operational in less than 10 minutes. It has created a highly resilient ecosystem in which we’ve had zero data loss in five years.”
Robert Morrish
Chief Technology Officer, Haventec