雲【原生+開源+容器】應用安全架構
1c Cloud 平台2c K8s Cluster 4c Code
3c Container
公/私雲 IaaS 防護
K8s/Dockers Cluster
及 VM安全
容器安全 工作流及程式碼安全
Google
4C Layer
雲安全與維運
雲安全 DevSecOps
全域安全/網路/資料中心 開發團隊(DevOps)
安全維運
安全治理
CNAPP
雲端原生應用
程式防護平台 雲端安全狀態管理 (CSPM)
雲端工作負載防護平台 (CWPP)
雲端基礎架構授權管理(CIEM)
IaC Scan
Container Scan
資料來源:Check Point Software Technologies Ltd.
N
I
S
T
S
P
8
0
0
1
9
0
標
準
I
S
O
2
7
0
0
0
系
列
標
準
6
7.
應用系統開發架構 (DevOps) 之資安議題
Data/ Systems / Services
Application Behavior
(business logic, configuration, etc.)
Frameworks
Proprietary Code
OSS OSS OSS OSS
OSS OSS OSS
Web UI API / Service Interface
How can our
developers produce
code with fewer
defects and security
weaknesses (CWEs)
without slowing down?
How do we track and
manage open source
use and the security
and license compliance
risks that come with it?
How do we know we’ve
addressed runtime
vulnerabilities and data
protection issues
before we deploy?
How do we ensure the
protocols & APIs our
software exposes
aren’t vulnerable to
common hacks?
How do we integrate and
automate all of this?
7
8.
精誠 DevSecOps 解決方案架構
Howdo we integrate and
automate all of this?
Data / Systems / Services
Application Behavior
(business logic, configuration, etc.)
Frameworks
Proprietary Code
OSS OSS OSS OSS
OSS OSS OSS
Web UI API / Service Interface
How can our
developers produce
code with fewer
defects and security
weaknesses (CWEs)
without slowing down?
How do we track and
manage open source
use and the security
and license compliance
risks that come with it?
How do we know we’ve
addressed runtime
vulnerabilities and data
protection issues
before we deploy?
How do we ensure the
protocols & APIs our
software exposes
aren’t vulnerable to
common hacks?
Static
Analysis
Find and fix security
vulnerabilities and
quality issues in code
as it is being
developed
Coverity
Protocol & API
Fuzzing
Detect vulnerabilities
exposed through
protocols and APIs
Defensics
Interactive & Dynamic
Analysis
Pinpoint exploitable
vulnerabilities and
data protection issues
in web applications
Seeker & WhiteHat
Software Composition
Analysis
Detect and manage
open source and
third-party component
risks in development
and production
Black Duck
Intelligent Orchestration Code Dx
8