SlideShare a Scribd company logo
InterConnect
2017
Securing Your Docker
Environment with
Vulnerability Advisor in IBM
Bluemix Container Service
Chris Rosen
Senior Technical Offering Manager
crosen@us.ibm.com
Canturk Isci
Research Manager,
canturk@us.ibm.com
1 5/16/2018
2 5/16/2018
Please note
IBM’s statements regarding its plans, directions, and intent
are subject to change or withdrawal without notice at IBM’s
sole discretion.
Information regarding potential future products is intended to
outline our general product direction and it should not be relied
on in making a purchasing decision.
The information mentioned regarding potential future products
is not a commitment, promise, or legal obligation to deliver
any material, code or functionality. Information about potential
future products may not be incorporated into any contract.
The development, release, and timing of any future features
or functionality described for our products remains at our sole
discretion.
Performance is based on measurements and projections
using standard IBM benchmarks in a controlled environment.
The actual throughput or performance that any user will
experience will vary depending upon many factors, including
considerations such as the amount of multiprogramming in
the user’s job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no
assurance can be given that an individual user will achieve
results similar to those stated here.
AGENDA
• Getting started with Docker
• Scared straight – security concerns everywhere
• IBM Bluemix Container Service
• DevSecOps
• Vulnerability Advisor details
New Section
Docker pull wordpress
Docker run wordpress
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
“Over 30% of Official
Images in DockerHub
Contain High Priority
Security Vulnerabilities”
Banyan Ops report
Source: http://bit.ly/2eknhJs
“80% of attacks leverage known
vulnerabilities and configuration
management setting weaknesses”
US State Department report
Source: http://bit.ly/2esbkke
The Heartbleed bug allows anyone on the Internet to
read the memory of the systems protected by the
vulnerable versions of the OpenSSL software. This
compromises the secret keys used to identify the service
providers and to encrypt the traffic, the names and
passwords of the users and the actual content. This
allows attackers to eavesdrop on communications, steal
data directly from the services and users and to
impersonate services and users.
Source: http://heartbleed.com
The consequences of an attacker
successfully exploiting this vulnerability
on a Web server are serious in nature.
For example attackers may have the
ability to dump password files or
download malware on to infected
computers. Once inside the victim’s
firewall, the attackers could then
compromise and infect other
computers on the network.
Source: http://symc.ly/2e1blNM
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
New Section
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
IBM Bluemix Container Service
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
• Fully managed hosted
runtime
• Integrated logging and
monitoring
• Container groups
• Private hosted registry
• Persistent storage
• Advanced security
features
• Built using Docker
technologyIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Beta available March 20th.
Combining Docker and Kubernetes to deliver powerful tools,
an intuitive user experience, and built-in security and
isolation to enable rapid delivery of applications - all while
leveraging IBM Cloud Services including cognitive
capabilities from Watson.
www.ibm.com/cloud-computing/bluemix/containers
IBM Bluemix Container Service
Intelligent Scheduling Automated rollouts and rollbacks Container Security & PrivacyDesign Your Own Cluster
Self-healing Horizontal scaling Leverages IBM Cloud & Watson Integrated Operational Tools
Service discovery & load balancing Secret & configuration management Simplified Cluster Management Native Kubernetes Experience
IBM Bluemix Container Service
Slide Title Goes HerePersonas
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Value for both the provider and consumer
(Ex: User pushes their custom images into IBM Bluemix Container Registry)
I want to meet my organization’s security & compliance
criteria without having to jump through a complex process
We want to make sure images don’t introduce malware
and misbehaved applications into the IBM Cloud.
Analyze and report in near real-time where vulnerabilities
exist.
I want to enforce my organization’s security & compliance
policies across our enterprise applications on Bluemix
I want to audit my organizations overall compliance
posture
Developers/
Testers
IBM Cloud
Security
&
Operations
New Section
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HereDevSecOps
D e ve l o p m e n t + S e c u r i t y + O p e r a t i o n s
 The purpose and intent of DevSecOps is to build on the mindset that "everyone is
responsible for security" with the goal of safely distributing security decisions at
speed and scale to those who hold the highest level of context without sacrificing the
safety required.
Source: http://www.devsecops.org/blog/2015/2/15/what-is-devsecops
 The goal of DevSecOps is to enable teams to release intrinsically secure software at
the speed of DevOps.
 Security as code
 Integration with existing CI/CD pipelines
 Ability to scan and run tests in every stage of deployment
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
What is
Vulnerability
Advisor?
• VA is a service within IBM Bluemix Container Service combining
platform visibility and threat intelligence for early detection of
vulnerabilities.
• VA is providing security and compliance insight to your Docker
images and containers that run in the IBM Cloud.
• VA reduces the effort, but does not change the responsibility model.
• VA is designed to scan new and existing images, identifying new
vulnerabilities as they are identified.
• VA is intended to be used against all of your test, development,
and production environments.
• VA uses introspection technology, therefore no agents or image
modifications are required.
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
VA
Concepts
Policy Violations
Configuring policy to determine if a vulnerable image can be
deployed by users
Vulnerable Packages
Analyzing a Docker image and container packages for security
vulnerabilities
Best Practice Improvements
• A set of security checks
• Provide recommendations to remediate
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Security Misconfigurations
• A security misconfiguration issue in your application
• Provide insight for remediating these misconfigurations
Slide Title Goes HereI B M B l u e m i x C o n t a i n e r S e r vi c e H i s t o r y
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
IBM Bluemix
Container
Service go-live
in Dallas
June 2015 July 2015 Sept 2015 Nov 2015 Oct 2016
Vulnerability
Advisor (VA)
launches for
image
vulnerability
scanning
IBM Bluemix
Container
Service go-live
in London
VA scanning
images for
weak
configurations
and ability to
set deployment
policies
VA scanning
live containers
Secure Config
Advisor for
applications
VA scanning
for POWER
Docker images
Nov 2016
File-based
malware
detection
Risk Analysis
for discovered
vulnerabilities
Jan 2017
Integration with
IBM X-Force
Simplifying the user experience
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
TITLE
subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 18
Day Zero Docker Image Scanning
Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HereSelect an image from your registry
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HerePolicy Violations
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HereVulnerable Packages
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HereCVE (Common Vulnerabilities & Exposures)
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
 Publicly known security issues
 Vulnerabilities
 Exposures
 Risk management
Slide Title Goes HereBest Practice Improvements
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Description: Minimum password length not specified in
/etc/pam.d/common-password
Corrective Action: Minimum password length must be 8.
TITLE
subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 24
Secure Config Advisor
Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HereApache: Vulnerable
Use of insecure ciphers
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Summary of insecure configurations in detected
application (Apache web server)
Use of insecure cipher suite in
Apache web server configuration found
Slide Title Goes HereApache: Remediated
Developer fixed the cipher suite in Apache w eb server configuration
and pushed a new Docker image. The scan verified the fix.
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
V11: Version with insecure cipher suite was v10
The developer remediated the cipher suite in Apache web server
configuration and created a new Docker image. The scan has verified the
fix resolved the vulnerability.
TITLE
subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 27
Day 1+ Container Scanning
Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HereDeployed Containers
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HereContainers Report
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
TITLE
subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 30
Policy Management
Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HereImage Deployment Policies
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
TITLE
subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 32
Risk Analysis
Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HereHow bad is it really?
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HereRisk Analysis Details
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
This pane shows a base score of a
CVE having the maximum value in the
image.
This pane shows a temporal score of
the CVE having the maximum base
score showing on the left side.
CVE-2015-0860
TITLE
subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 35
Malware Detection
Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HereMalware Detection Details
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Additional Best Practice Rule for malware detection
TITLE
subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 37
Secure your Pipeline
Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Slide Title Goes HereVA Security Built into Your Dev[Sec]Ops Pipeline
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
TITLE
subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 39
Conclusion
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
Containers are the next generation of cloud computing.
According to Enterprise Technology Research, 97% of enterprises interviewed plan to
implement Docker container technology.
Containers enable innovation and speed and without the proper security insight can
lead to catastrophic problems for your business.
IBM Bluemix Container Service makes security a first class component of the offering
and simplifies security insights.
Slide Title Goes HereThere is a Blog for That…
IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
• Day1+: https://www.ibm.com/blogs/bluemix/2016/11/vulnerability-advisor-secure-your-dev-ops-across-containers/
• PowerVA: https://www.ibm.com/blogs/bluemix/2016/11/secure-your-docker-containers-on-power-with-vulnerability-advisor/
• SecConfig: https://www.ibm.com/blogs/bluemix/2016/11/identifying-insecure-configurations-with-ibm-vulnerability-advisor/
• Malware: https://www.ibm.com/blogs/bluemix/2017/01/vulnerability-advisor-file-based-malware/
• Drift: https://www.ibm.com/blogs/bluemix/2017/01/vulnerability-advisor-app-security/
• Risk Analysis: https://www.ibm.com/blogs/bluemix/2017/02/assessing-security-risk-containers-vulnerability-advisor/
41 5/16/2018
Notices and disclaimers
Copyright © 2017 by International Business Machines Corporation (IBM).
No part of this document may be reproduced or transmitted in any form
without written permission from IBM.
U.S. Government Users Restricted Rights — use, duplication or
disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to
products that have not yet been announced by IBM) has been reviewed
for accuracy as of the date of initial publication and could include
unintentional technical or typographical errors. IBM shall have no
responsibility to update this information. This document is distributed
“as is” without any warranty, either express or implied. In no event
shall IBM be liable for any damage arising from the use of this
information, including but not limited to, loss of data, business
interruption, loss of profit or loss of opportunity. IBM products and
services are warranted according to the terms and conditions of the
agreements under which they are provided.
IBM products are manufactured from new parts or new and used parts.
In some cases, a product may not be new and may have been previously
installed. Regardless, our warranty terms apply.”
Any statements regarding IBM's future direction, intent or product
plans are subject to change or withdrawal without notice.
Performance data contained herein was generally obtained in a
controlled, isolated environments. Customer examples are presented
as illustrations of how those customers have used IBM products and
the results they may have achieved. Actual performance, cost, savings or
other results in other operating environments may vary.
References in this document to IBM products, programs, or services
does not imply that IBM intends to make such products, programs or
services available in all countries in which IBM operates or does
business.
Workshops, sessions and associated materials may have been prepared
by independent session speakers, and do not necessarily reflect the
views of IBM. All materials and discussions are provided for informational
purposes only, and are neither intended to, nor shall constitute legal or
other guidance or advice to any individual participant or their specific
situation.
It is the customer’s responsibility to insure its own compliance with legal
requirements and to obtain advice of competent legal counsel as to
the identification and interpretation of any relevant laws and regulatory
requirements that may affect the customer’s business and any actions
the customer may need to take to comply with such laws. IBM does not
provide legal advice or represent or warrant that its services or products
will ensure that the customer is in compliance with any law.
42 5/16/2018
Notices and disclaimers
continued
Information concerning non-IBM products was obtained from the
suppliers of those products, their published announcements or other
publicly available sources. IBM has not tested those products in
connection with this publication and cannot confirm the accuracy of
performance, compatibility or any other claims related to non-IBM
products. Questions on the capabilities of non-IBM products should be
addressed to the suppliers of those products. IBM does not warrant the
quality of any third-party products, or the ability of any such third-party
products to interoperate with IBM’s products. IBM expressly disclaims
all warranties, expressed or implied, including but not limited to, the
implied warranties of merchantability and fitness for a particular,
purpose.
The provision of the information contained herein is not intended to, and
does not, grant any right or license under any IBM patents, copyrights,
trademarks or other intellectual property right.
IBM, the IBM logo, ibm.com, Aspera®, Bluemix, Blueworks Live, CICS,
Clearcase, Cognos®, DOORS®, Emptoris®, Enterprise Document
Management System™, FASP®, FileNet®, Global Business Services®,
Global Technology Services®, IBM ExperienceOne™, IBM SmartCloud®,
IBM Social Business®, Information on Demand, ILOG, Maximo®,
MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower,
PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®,
PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®,
PureSystems®, QRadar®, Rational®, Rhapsody®, Smarter Commerce®,
SoDA, SPSS, Sterling Commerce®, StoredIQ, Tealeaf®, Tivoli® Trusteer®,
Unica®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and
System z® Z/OS, are trademarks of International Business Machines
Corporation, registered in many jurisdictions worldwide. Other product
and service names might be trademarks of IBM or other companies. A
current list of IBM trademarks is available on the Web at "Copyright and
trademark information" at: www.ibm.com/legal/copytrade.shtml.
InterConnect
2017
Thank you
Learn more:
https://www.ibm.com/cloud-
computing/bluemix/containers
43 5/16/2018

More Related Content

What's hot

The Bluemix Quadruple Threat
The Bluemix Quadruple ThreatThe Bluemix Quadruple Threat
The Bluemix Quadruple Threat
Ram Vennam
 
IBM Softlayer Bluemix Marketplace
IBM Softlayer Bluemix MarketplaceIBM Softlayer Bluemix Marketplace
IBM Softlayer Bluemix Marketplace
Simon Baker
 
IBM Bluemix
IBM BluemixIBM Bluemix
IBM Bluemix
Andrzej Osmak
 
Deployment Automation for Hybrid Cloud and Multi-Platform Environments
Deployment Automation for Hybrid Cloud and Multi-Platform EnvironmentsDeployment Automation for Hybrid Cloud and Multi-Platform Environments
Deployment Automation for Hybrid Cloud and Multi-Platform Environments
IBM UrbanCode Products
 
Developing for Hybrid Cloud with Bluemix
Developing for Hybrid Cloud with BluemixDeveloping for Hybrid Cloud with Bluemix
Developing for Hybrid Cloud with Bluemix
Roberto Pozzi
 
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointVirtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
HyTrust
 
Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise Apps
 Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise Apps Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise Apps
Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise Apps
Michael Elder
 
An architect’s guide to leveraging your incumbency
An architect’s guide to leveraging your incumbencyAn architect’s guide to leveraging your incumbency
An architect’s guide to leveraging your incumbency
Michael Elder
 
Helping Organizations Realize the Value of DevOps with Continuous Software De...
Helping Organizations Realize the Value of DevOps with Continuous Software De...Helping Organizations Realize the Value of DevOps with Continuous Software De...
Helping Organizations Realize the Value of DevOps with Continuous Software De...
IBM UrbanCode Products
 
UrbanCode Deploy DevOps Best Practices
UrbanCode Deploy  DevOps Best PracticesUrbanCode Deploy  DevOps Best Practices
UrbanCode Deploy DevOps Best Practices
Michael Elder
 
What's new in IBM MQ
What's new in IBM MQWhat's new in IBM MQ
What's new in IBM MQ
Robert Parker
 
Turning up the HEAT with IBM MobileFirst for iOS Apps (Interconnect 2016)
Turning up the HEAT with IBM MobileFirst for iOS Apps (Interconnect 2016)Turning up the HEAT with IBM MobileFirst for iOS Apps (Interconnect 2016)
Turning up the HEAT with IBM MobileFirst for iOS Apps (Interconnect 2016)
Michael Elder
 
Hybrid Cloud DevOps with Apprenda and UrbanCode Deploy
Hybrid Cloud DevOps with Apprenda and UrbanCode DeployHybrid Cloud DevOps with Apprenda and UrbanCode Deploy
Hybrid Cloud DevOps with Apprenda and UrbanCode Deploy
Claudia Ring
 
Elevating your Continuous Delivery Strategy Above the Rolling Clouds
Elevating your Continuous Delivery Strategy Above the Rolling CloudsElevating your Continuous Delivery Strategy Above the Rolling Clouds
Elevating your Continuous Delivery Strategy Above the Rolling Clouds
Michael Elder
 
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps
IBM UrbanCode Products
 
Mc afee saas web protection-rackaid
Mc afee saas web protection-rackaidMc afee saas web protection-rackaid
Mc afee saas web protection-rackaid
rackAID Support
 
Improving Software Delivery with DevOps & Software Defined Environments | The...
Improving Software Delivery with DevOps & Software Defined Environments | The...Improving Software Delivery with DevOps & Software Defined Environments | The...
Improving Software Delivery with DevOps & Software Defined Environments | The...
IBM UrbanCode Products
 
Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)
Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)
Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)
Michael Elder
 
3298 microservices and how they relate to esb api and messaging - inter con...
3298   microservices and how they relate to esb api and messaging - inter con...3298   microservices and how they relate to esb api and messaging - inter con...
3298 microservices and how they relate to esb api and messaging - inter con...
Kim Clark
 
Applying DevOps, PaaS and cloud for better citizen service outcomes - IBM Fe...
Applying DevOps, PaaS and cloud for better citizen service  outcomes - IBM Fe...Applying DevOps, PaaS and cloud for better citizen service  outcomes - IBM Fe...
Applying DevOps, PaaS and cloud for better citizen service outcomes - IBM Fe...
Sanjeev Sharma
 

What's hot (20)

The Bluemix Quadruple Threat
The Bluemix Quadruple ThreatThe Bluemix Quadruple Threat
The Bluemix Quadruple Threat
 
IBM Softlayer Bluemix Marketplace
IBM Softlayer Bluemix MarketplaceIBM Softlayer Bluemix Marketplace
IBM Softlayer Bluemix Marketplace
 
IBM Bluemix
IBM BluemixIBM Bluemix
IBM Bluemix
 
Deployment Automation for Hybrid Cloud and Multi-Platform Environments
Deployment Automation for Hybrid Cloud and Multi-Platform EnvironmentsDeployment Automation for Hybrid Cloud and Multi-Platform Environments
Deployment Automation for Hybrid Cloud and Multi-Platform Environments
 
Developing for Hybrid Cloud with Bluemix
Developing for Hybrid Cloud with BluemixDeveloping for Hybrid Cloud with Bluemix
Developing for Hybrid Cloud with Bluemix
 
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointVirtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
 
Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise Apps
 Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise Apps Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise Apps
Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise Apps
 
An architect’s guide to leveraging your incumbency
An architect’s guide to leveraging your incumbencyAn architect’s guide to leveraging your incumbency
An architect’s guide to leveraging your incumbency
 
Helping Organizations Realize the Value of DevOps with Continuous Software De...
Helping Organizations Realize the Value of DevOps with Continuous Software De...Helping Organizations Realize the Value of DevOps with Continuous Software De...
Helping Organizations Realize the Value of DevOps with Continuous Software De...
 
UrbanCode Deploy DevOps Best Practices
UrbanCode Deploy  DevOps Best PracticesUrbanCode Deploy  DevOps Best Practices
UrbanCode Deploy DevOps Best Practices
 
What's new in IBM MQ
What's new in IBM MQWhat's new in IBM MQ
What's new in IBM MQ
 
Turning up the HEAT with IBM MobileFirst for iOS Apps (Interconnect 2016)
Turning up the HEAT with IBM MobileFirst for iOS Apps (Interconnect 2016)Turning up the HEAT with IBM MobileFirst for iOS Apps (Interconnect 2016)
Turning up the HEAT with IBM MobileFirst for iOS Apps (Interconnect 2016)
 
Hybrid Cloud DevOps with Apprenda and UrbanCode Deploy
Hybrid Cloud DevOps with Apprenda and UrbanCode DeployHybrid Cloud DevOps with Apprenda and UrbanCode Deploy
Hybrid Cloud DevOps with Apprenda and UrbanCode Deploy
 
Elevating your Continuous Delivery Strategy Above the Rolling Clouds
Elevating your Continuous Delivery Strategy Above the Rolling CloudsElevating your Continuous Delivery Strategy Above the Rolling Clouds
Elevating your Continuous Delivery Strategy Above the Rolling Clouds
 
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps
Mobile to mainframe - The Challenges and Best Practices of Enterprise DevOps
 
Mc afee saas web protection-rackaid
Mc afee saas web protection-rackaidMc afee saas web protection-rackaid
Mc afee saas web protection-rackaid
 
Improving Software Delivery with DevOps & Software Defined Environments | The...
Improving Software Delivery with DevOps & Software Defined Environments | The...Improving Software Delivery with DevOps & Software Defined Environments | The...
Improving Software Delivery with DevOps & Software Defined Environments | The...
 
Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)
Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)
Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)
 
3298 microservices and how they relate to esb api and messaging - inter con...
3298   microservices and how they relate to esb api and messaging - inter con...3298   microservices and how they relate to esb api and messaging - inter con...
3298 microservices and how they relate to esb api and messaging - inter con...
 
Applying DevOps, PaaS and cloud for better citizen service outcomes - IBM Fe...
Applying DevOps, PaaS and cloud for better citizen service  outcomes - IBM Fe...Applying DevOps, PaaS and cloud for better citizen service  outcomes - IBM Fe...
Applying DevOps, PaaS and cloud for better citizen service outcomes - IBM Fe...
 

Similar to VA_InterConnect2017

Vulnerability Advisor Deep Dive (Dec 2016)
Vulnerability Advisor Deep Dive (Dec 2016)Vulnerability Advisor Deep Dive (Dec 2016)
Vulnerability Advisor Deep Dive (Dec 2016)
Canturk Isci
 
WebSphere Liberty and IBM Containers: The Perfect Combination for Java Micros...
WebSphere Liberty and IBM Containers: The Perfect Combination for Java Micros...WebSphere Liberty and IBM Containers: The Perfect Combination for Java Micros...
WebSphere Liberty and IBM Containers: The Perfect Combination for Java Micros...
David Currie
 
Ibm business partner connect 2015 long fong yee v1 (read-only)
Ibm business partner connect 2015   long fong yee v1 (read-only)Ibm business partner connect 2015   long fong yee v1 (read-only)
Ibm business partner connect 2015 long fong yee v1 (read-only)
Fong Yee Long
 
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
Daniel Berg
 
Skip the anxiety attack when building secure containerized apps
Skip the anxiety attack when building secure containerized appsSkip the anxiety attack when building secure containerized apps
Skip the anxiety attack when building secure containerized apps
Haidee McMahon
 
IBM Codename: Bluemix - Cloudfoundry, PaaS development and deployment trainin...
IBM Codename: Bluemix - Cloudfoundry, PaaS development and deployment trainin...IBM Codename: Bluemix - Cloudfoundry, PaaS development and deployment trainin...
IBM Codename: Bluemix - Cloudfoundry, PaaS development and deployment trainin...
Romeo Kienzler
 
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Vidyasagar Machupalli
 
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...
Michael Elder
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Amazon Web Services
 
Become an IBM Cloud Architect in 40 Minutes
Become an IBM Cloud Architect in 40 MinutesBecome an IBM Cloud Architect in 40 Minutes
Become an IBM Cloud Architect in 40 Minutes
Andrew Ferrier
 
IBM Impact Session 2351 hybrid apps
IBM Impact Session 2351 hybrid appsIBM Impact Session 2351 hybrid apps
IBM Impact Session 2351 hybrid apps
nick_garrod
 
Bluemix DevOps Meetup
Bluemix DevOps MeetupBluemix DevOps Meetup
Bluemix DevOps Meetup
Kyle Brown
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
Eduardo Patrocinio
 
IBM Bluemix OpenWhisk: IBM InterConnect 2017, Las Vegas, USA: Technical Strategy
IBM Bluemix OpenWhisk: IBM InterConnect 2017, Las Vegas, USA: Technical StrategyIBM Bluemix OpenWhisk: IBM InterConnect 2017, Las Vegas, USA: Technical Strategy
IBM Bluemix OpenWhisk: IBM InterConnect 2017, Las Vegas, USA: Technical Strategy
OpenWhisk
 
The new developer experience
The new developer experienceThe new developer experience
The new developer experience
Eric Cattoir
 
How Does IBM Deliver Cloud Security Paper
How Does IBM Deliver Cloud Security PaperHow Does IBM Deliver Cloud Security Paper
How Does IBM Deliver Cloud Security Paper
IBM
 
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM CloudDevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
Michael Elder
 
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Amazon Web Services
 
Implementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for Integration
Kim Clark
 
Bluemix the digital innovation platform
Bluemix   the digital innovation platformBluemix   the digital innovation platform
Bluemix the digital innovation platform
Jose Pena
 

Similar to VA_InterConnect2017 (20)

Vulnerability Advisor Deep Dive (Dec 2016)
Vulnerability Advisor Deep Dive (Dec 2016)Vulnerability Advisor Deep Dive (Dec 2016)
Vulnerability Advisor Deep Dive (Dec 2016)
 
WebSphere Liberty and IBM Containers: The Perfect Combination for Java Micros...
WebSphere Liberty and IBM Containers: The Perfect Combination for Java Micros...WebSphere Liberty and IBM Containers: The Perfect Combination for Java Micros...
WebSphere Liberty and IBM Containers: The Perfect Combination for Java Micros...
 
Ibm business partner connect 2015 long fong yee v1 (read-only)
Ibm business partner connect 2015   long fong yee v1 (read-only)Ibm business partner connect 2015   long fong yee v1 (read-only)
Ibm business partner connect 2015 long fong yee v1 (read-only)
 
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
 
Skip the anxiety attack when building secure containerized apps
Skip the anxiety attack when building secure containerized appsSkip the anxiety attack when building secure containerized apps
Skip the anxiety attack when building secure containerized apps
 
IBM Codename: Bluemix - Cloudfoundry, PaaS development and deployment trainin...
IBM Codename: Bluemix - Cloudfoundry, PaaS development and deployment trainin...IBM Codename: Bluemix - Cloudfoundry, PaaS development and deployment trainin...
IBM Codename: Bluemix - Cloudfoundry, PaaS development and deployment trainin...
 
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
 
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
 
Become an IBM Cloud Architect in 40 Minutes
Become an IBM Cloud Architect in 40 MinutesBecome an IBM Cloud Architect in 40 Minutes
Become an IBM Cloud Architect in 40 Minutes
 
IBM Impact Session 2351 hybrid apps
IBM Impact Session 2351 hybrid appsIBM Impact Session 2351 hybrid apps
IBM Impact Session 2351 hybrid apps
 
Bluemix DevOps Meetup
Bluemix DevOps MeetupBluemix DevOps Meetup
Bluemix DevOps Meetup
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
 
IBM Bluemix OpenWhisk: IBM InterConnect 2017, Las Vegas, USA: Technical Strategy
IBM Bluemix OpenWhisk: IBM InterConnect 2017, Las Vegas, USA: Technical StrategyIBM Bluemix OpenWhisk: IBM InterConnect 2017, Las Vegas, USA: Technical Strategy
IBM Bluemix OpenWhisk: IBM InterConnect 2017, Las Vegas, USA: Technical Strategy
 
The new developer experience
The new developer experienceThe new developer experience
The new developer experience
 
How Does IBM Deliver Cloud Security Paper
How Does IBM Deliver Cloud Security PaperHow Does IBM Deliver Cloud Security Paper
How Does IBM Deliver Cloud Security Paper
 
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM CloudDevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
 
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
 
Implementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for Integration
 
Bluemix the digital innovation platform
Bluemix   the digital innovation platformBluemix   the digital innovation platform
Bluemix the digital innovation platform
 

More from Canturk Isci

Vulnerability Advisor: DevSecOps Integration
Vulnerability Advisor: DevSecOps IntegrationVulnerability Advisor: DevSecOps Integration
Vulnerability Advisor: DevSecOps Integration
Canturk Isci
 
Cloud Foundations: Visibility, Analytics, Security, Programming Models, Runtime
Cloud Foundations: Visibility, Analytics, Security, Programming Models, RuntimeCloud Foundations: Visibility, Analytics, Security, Programming Models, Runtime
Cloud Foundations: Visibility, Analytics, Security, Programming Models, Runtime
Canturk Isci
 
Cloud Security & Compliance - JPMC Overview
Cloud Security & Compliance - JPMC OverviewCloud Security & Compliance - JPMC Overview
Cloud Security & Compliance - JPMC Overview
Canturk Isci
 
Rutgers Cloud Seminar 2017
Rutgers Cloud Seminar 2017Rutgers Cloud Seminar 2017
Rutgers Cloud Seminar 2017
Canturk Isci
 
Operational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU SeminarOperational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU Seminar
Canturk Isci
 
Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016
Canturk Isci
 
20160221 va interconnect_pub
20160221 va interconnect_pub20160221 va interconnect_pub
20160221 va interconnect_pub
Canturk Isci
 

More from Canturk Isci (7)

Vulnerability Advisor: DevSecOps Integration
Vulnerability Advisor: DevSecOps IntegrationVulnerability Advisor: DevSecOps Integration
Vulnerability Advisor: DevSecOps Integration
 
Cloud Foundations: Visibility, Analytics, Security, Programming Models, Runtime
Cloud Foundations: Visibility, Analytics, Security, Programming Models, RuntimeCloud Foundations: Visibility, Analytics, Security, Programming Models, Runtime
Cloud Foundations: Visibility, Analytics, Security, Programming Models, Runtime
 
Cloud Security & Compliance - JPMC Overview
Cloud Security & Compliance - JPMC OverviewCloud Security & Compliance - JPMC Overview
Cloud Security & Compliance - JPMC Overview
 
Rutgers Cloud Seminar 2017
Rutgers Cloud Seminar 2017Rutgers Cloud Seminar 2017
Rutgers Cloud Seminar 2017
 
Operational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU SeminarOperational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU Seminar
 
Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016
 
20160221 va interconnect_pub
20160221 va interconnect_pub20160221 va interconnect_pub
20160221 va interconnect_pub
 

Recently uploaded

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

VA_InterConnect2017

  • 1. InterConnect 2017 Securing Your Docker Environment with Vulnerability Advisor in IBM Bluemix Container Service Chris Rosen Senior Technical Offering Manager crosen@us.ibm.com Canturk Isci Research Manager, canturk@us.ibm.com 1 5/16/2018
  • 2. 2 5/16/2018 Please note IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
  • 3. AGENDA • Getting started with Docker • Scared straight – security concerns everywhere • IBM Bluemix Container Service • DevSecOps • Vulnerability Advisor details
  • 4. New Section Docker pull wordpress Docker run wordpress IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 5. “Over 30% of Official Images in DockerHub Contain High Priority Security Vulnerabilities” Banyan Ops report Source: http://bit.ly/2eknhJs “80% of attacks leverage known vulnerabilities and configuration management setting weaknesses” US State Department report Source: http://bit.ly/2esbkke The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users. Source: http://heartbleed.com The consequences of an attacker successfully exploiting this vulnerability on a Web server are serious in nature. For example attackers may have the ability to dump password files or download malware on to infected computers. Once inside the victim’s firewall, the attackers could then compromise and infect other computers on the network. Source: http://symc.ly/2e1blNM IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 6. New Section IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 7. IBM Bluemix Container Service IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 8. • Fully managed hosted runtime • Integrated logging and monitoring • Container groups • Private hosted registry • Persistent storage • Advanced security features • Built using Docker technologyIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 9. Beta available March 20th. Combining Docker and Kubernetes to deliver powerful tools, an intuitive user experience, and built-in security and isolation to enable rapid delivery of applications - all while leveraging IBM Cloud Services including cognitive capabilities from Watson. www.ibm.com/cloud-computing/bluemix/containers IBM Bluemix Container Service
  • 10. Intelligent Scheduling Automated rollouts and rollbacks Container Security & PrivacyDesign Your Own Cluster Self-healing Horizontal scaling Leverages IBM Cloud & Watson Integrated Operational Tools Service discovery & load balancing Secret & configuration management Simplified Cluster Management Native Kubernetes Experience IBM Bluemix Container Service
  • 11. Slide Title Goes HerePersonas IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation Value for both the provider and consumer (Ex: User pushes their custom images into IBM Bluemix Container Registry) I want to meet my organization’s security & compliance criteria without having to jump through a complex process We want to make sure images don’t introduce malware and misbehaved applications into the IBM Cloud. Analyze and report in near real-time where vulnerabilities exist. I want to enforce my organization’s security & compliance policies across our enterprise applications on Bluemix I want to audit my organizations overall compliance posture Developers/ Testers IBM Cloud Security & Operations
  • 12. New Section IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 13. Slide Title Goes HereDevSecOps D e ve l o p m e n t + S e c u r i t y + O p e r a t i o n s  The purpose and intent of DevSecOps is to build on the mindset that "everyone is responsible for security" with the goal of safely distributing security decisions at speed and scale to those who hold the highest level of context without sacrificing the safety required. Source: http://www.devsecops.org/blog/2015/2/15/what-is-devsecops  The goal of DevSecOps is to enable teams to release intrinsically secure software at the speed of DevOps.  Security as code  Integration with existing CI/CD pipelines  Ability to scan and run tests in every stage of deployment IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 14. What is Vulnerability Advisor? • VA is a service within IBM Bluemix Container Service combining platform visibility and threat intelligence for early detection of vulnerabilities. • VA is providing security and compliance insight to your Docker images and containers that run in the IBM Cloud. • VA reduces the effort, but does not change the responsibility model. • VA is designed to scan new and existing images, identifying new vulnerabilities as they are identified. • VA is intended to be used against all of your test, development, and production environments. • VA uses introspection technology, therefore no agents or image modifications are required. IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 15. VA Concepts Policy Violations Configuring policy to determine if a vulnerable image can be deployed by users Vulnerable Packages Analyzing a Docker image and container packages for security vulnerabilities Best Practice Improvements • A set of security checks • Provide recommendations to remediate IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation Security Misconfigurations • A security misconfiguration issue in your application • Provide insight for remediating these misconfigurations
  • 16. Slide Title Goes HereI B M B l u e m i x C o n t a i n e r S e r vi c e H i s t o r y IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation IBM Bluemix Container Service go-live in Dallas June 2015 July 2015 Sept 2015 Nov 2015 Oct 2016 Vulnerability Advisor (VA) launches for image vulnerability scanning IBM Bluemix Container Service go-live in London VA scanning images for weak configurations and ability to set deployment policies VA scanning live containers Secure Config Advisor for applications VA scanning for POWER Docker images Nov 2016 File-based malware detection Risk Analysis for discovered vulnerabilities Jan 2017 Integration with IBM X-Force
  • 17. Simplifying the user experience IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 18. TITLE subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 18 Day Zero Docker Image Scanning Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 19. Slide Title Goes HereSelect an image from your registry IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 20. Slide Title Goes HerePolicy Violations IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 21. Slide Title Goes HereVulnerable Packages IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 22. Slide Title Goes HereCVE (Common Vulnerabilities & Exposures) IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation  Publicly known security issues  Vulnerabilities  Exposures  Risk management
  • 23. Slide Title Goes HereBest Practice Improvements IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation Description: Minimum password length not specified in /etc/pam.d/common-password Corrective Action: Minimum password length must be 8.
  • 24. TITLE subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 24 Secure Config Advisor Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 25. Slide Title Goes HereApache: Vulnerable Use of insecure ciphers IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation Summary of insecure configurations in detected application (Apache web server) Use of insecure cipher suite in Apache web server configuration found
  • 26. Slide Title Goes HereApache: Remediated Developer fixed the cipher suite in Apache w eb server configuration and pushed a new Docker image. The scan verified the fix. IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation V11: Version with insecure cipher suite was v10 The developer remediated the cipher suite in Apache web server configuration and created a new Docker image. The scan has verified the fix resolved the vulnerability.
  • 27. TITLE subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 27 Day 1+ Container Scanning Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 28. Slide Title Goes HereDeployed Containers IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 29. Slide Title Goes HereContainers Report IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 30. TITLE subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 30 Policy Management Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 31. Slide Title Goes HereImage Deployment Policies IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 32. TITLE subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 32 Risk Analysis Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 33. Slide Title Goes HereHow bad is it really? IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 34. Slide Title Goes HereRisk Analysis Details IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation This pane shows a base score of a CVE having the maximum value in the image. This pane shows a temporal score of the CVE having the maximum base score showing on the left side. CVE-2015-0860
  • 35. TITLE subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 35 Malware Detection Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 36. Slide Title Goes HereMalware Detection Details IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation Additional Best Practice Rule for malware detection
  • 37. TITLE subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 37 Secure your Pipeline Vulnerability AdvisorIBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 38. Slide Title Goes HereVA Security Built into Your Dev[Sec]Ops Pipeline IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation
  • 39. TITLE subtitleBluemix Design System | IBM Confidential | ©2016 IBM Corporation 39 Conclusion IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation Containers are the next generation of cloud computing. According to Enterprise Technology Research, 97% of enterprises interviewed plan to implement Docker container technology. Containers enable innovation and speed and without the proper security insight can lead to catastrophic problems for your business. IBM Bluemix Container Service makes security a first class component of the offering and simplifies security insights.
  • 40. Slide Title Goes HereThere is a Blog for That… IBM Bluemix Container Service | IBM Confidential | ©2017 IBM Corporation • Day1+: https://www.ibm.com/blogs/bluemix/2016/11/vulnerability-advisor-secure-your-dev-ops-across-containers/ • PowerVA: https://www.ibm.com/blogs/bluemix/2016/11/secure-your-docker-containers-on-power-with-vulnerability-advisor/ • SecConfig: https://www.ibm.com/blogs/bluemix/2016/11/identifying-insecure-configurations-with-ibm-vulnerability-advisor/ • Malware: https://www.ibm.com/blogs/bluemix/2017/01/vulnerability-advisor-file-based-malware/ • Drift: https://www.ibm.com/blogs/bluemix/2017/01/vulnerability-advisor-app-security/ • Risk Analysis: https://www.ibm.com/blogs/bluemix/2017/02/assessing-security-risk-containers-vulnerability-advisor/
  • 41. 41 5/16/2018 Notices and disclaimers Copyright © 2017 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights — use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. This document is distributed “as is” without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. IBM products are manufactured from new parts or new and used parts. In some cases, a product may not be new and may have been previously installed. Regardless, our warranty terms apply.” Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.
  • 42. 42 5/16/2018 Notices and disclaimers continued Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM expressly disclaims all warranties, expressed or implied, including but not limited to, the implied warranties of merchantability and fitness for a particular, purpose. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, Aspera®, Bluemix, Blueworks Live, CICS, Clearcase, Cognos®, DOORS®, Emptoris®, Enterprise Document Management System™, FASP®, FileNet®, Global Business Services®, Global Technology Services®, IBM ExperienceOne™, IBM SmartCloud®, IBM Social Business®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, Smarter Commerce®, SoDA, SPSS, Sterling Commerce®, StoredIQ, Tealeaf®, Tivoli® Trusteer®, Unica®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.

Editor's Notes

  1. Managed infrastructure: Customer does not have to maintain physical hardware, operating systems, patches, etc IBM performs the scaling, operability, performance testing on new versions of open projects saving the customer time and frustration IBM provides the monitoring of the platform and the infrastructure We provide monitoring and logging tools to the users for the containerized workloads Security has two main branches: First is the infrastructure side that is required to maintain a multi-tenant public cloud Second is the user consumption of security and we’ve made it as easy as possible with Vulnerability Advisor Using existing open source projects from the community IBM has not forked anything
  2. To reconcile those two competing factors and to avoid data overload we have to optimize for the client experience This might sound obvious but often experience has been optimized for the business process and not for the individual client experiences Entire industries are being reformed based on this simple idea of using technology to put the client experience first.