AVOID CONTAMINATION IN
YOUR CONTAINERS.
AVOID CONTAMINATION
IN YOUR LINUX
CONTAINERS.
WHAT IS CONTAINER CONTAMINATION?
For containerized environments running on cloud servers like AWS, Azure, or Google, a container does a decent job keeping the application within it from accessing the host. But if a malicious actor can get inside the container, the application will be disrupted.
On a public-facing server, the potential for this type of intrusion is extremely high. While you may be doing everything correctly in terms of vulnerability patching, and coding best practices, can you feel confident that every other developer for third party applications you leverage are behaving the same way?
On top of that, we’ve also seen attackers able to pivot from container to container and attacking the host for maximal damage. You can prevent this using self-protecting containers.
HOW DOES ZEROLOCK SPC HELP PROTECT?
-
- Alert you to a change in operations within seconds of it happening
- Stop the change in operations in real-time
- Remediate any changes that were made due to the change of operations
WHERE CAN I FIND ZEROLOCK SPC?
ZeroLock SPC is the “Sec” in the DevSecOps bridge your security team has been looking for.
RedHat
Are you a part of the RedHat community and want to test out ZeroLock SPC for yourself? Download it from the Red Hat Ecosystem Catalog.
IronBank
If you have access to IronBank, you can also visit our partner page here
TECH SPECS
OS
Linux, kernel v3.5 or higher. Distribution agnostic.
Processor
x86-64, ARM-64 (coming soon)
Memory
25MB
Disk Space
50MB
Kernel Mods.
No kernel modification or modules required.
Contact us
"*" indicates required fields