<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application Container Security Basics in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Application-Container-Security-Basics/m-p/34680#M2572</link>
    <description>&lt;P&gt;Thank you for the reply. There is a lot to say about supply chain, even just in this context, so that might make for a good deeper dive post. I did have something in their about signing images, I must have removed it during editing, so that needs mentioned for sure. Also, I do work with programs that use&amp;nbsp;&lt;SPAN&gt;"private repositories", so that is a thing...maybe discussing/explaining that would make a good deep-dive post too. Thanks again for the feedback!&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 11 Apr 2020 01:33:31 GMT</pubDate>
    <dc:creator>scanlon</dc:creator>
    <dc:date>2020-04-11T01:33:31Z</dc:date>
    <item>
      <title>Application Container Security Basics</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Application-Container-Security-Basics/m-p/34618#M2561</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am sharing an article I recently wrote for SEI Insights, an online journal/blog from CMU:&lt;/P&gt;&lt;P&gt;&lt;A href="https://insights.sei.cmu.edu/sei_blog/2020/04/7-quick-steps-to-using-containers-securely.html" target="_blank"&gt;https://insights.sei.cmu.edu/sei_blog/2020/04/7-quick-steps-to-using-containers-securely.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is free of charge to read, we are a non-profit, I don't get anything from this. So this not a marketing thing, just sharing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyway, the intended audience was someone just getting into containerization (and not necessarily a big security budget) so just some basic security things for them to consider. Please share with anyone you think might benefit. Any feedback is welcome, good or bad, especially if you think there are some other obvious things that could&amp;nbsp; be done that aren't mentioned. Also, if there is any container security areas you think warrant a deeper dive, please mention as I have been asked to eventually write a follow-on post for more advanced users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks you,&lt;/P&gt;&lt;P&gt;Tom Scanlon, CISSP&lt;/P&gt;&lt;P&gt;Software Engineering Institute&lt;/P&gt;&lt;P&gt;Carnegie Mellon University&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 23:54:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Application-Container-Security-Basics/m-p/34618#M2561</guid>
      <dc:creator>scanlon</dc:creator>
      <dc:date>2020-04-09T23:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: Application Container Security Basics</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Application-Container-Security-Basics/m-p/34624#M2562</link>
      <description>&lt;P&gt;Nice article for people that still equate the cloud to VM's. Figure 4 shows some promise. You are on the right path. Now, how about saying something about the security of the supply chain? That is where our containers originate. No one uses their own "private repositories". What about signed images? People need to know what to trust. I'll read the references for the details, thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Source: Thomas Scanlon" style="width: 400px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/4000i89AFD96309F66074/image-size/medium?v=v2&amp;amp;px=400" role="button" title="containersupplychain.png" alt="Source: Thomas Scanlon" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Source: Thomas Scanlon&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2020 02:10:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Application-Container-Security-Basics/m-p/34624#M2562</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2020-04-10T02:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: Application Container Security Basics</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Application-Container-Security-Basics/m-p/34680#M2572</link>
      <description>&lt;P&gt;Thank you for the reply. There is a lot to say about supply chain, even just in this context, so that might make for a good deeper dive post. I did have something in their about signing images, I must have removed it during editing, so that needs mentioned for sure. Also, I do work with programs that use&amp;nbsp;&lt;SPAN&gt;"private repositories", so that is a thing...maybe discussing/explaining that would make a good deep-dive post too. Thanks again for the feedback!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Apr 2020 01:33:31 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Application-Container-Security-Basics/m-p/34680#M2572</guid>
      <dc:creator>scanlon</dc:creator>
      <dc:date>2020-04-11T01:33:31Z</dc:date>
    </item>
  </channel>
</rss>

