Enhancing Security of Docker Images in CI/CD Pipelines Using Best Practices for Container Hardening and Vulnerability Management
Authors: Charan Shankar Kummarapurugu
DOI: https://doi.org/10.5281/zenodo.14059466
Short DOI: https://doi.org/g8qjq6
Country: USA
Full-text Research PDF File:
View |
Download
Abstract: In this paper, we explore methods for enhancing the security of Docker images in CI/CD pipelines by utilizing best practices for container hardening and vulnerability man- agement. Container security has become increasingly critical as the adoption of containerized environments, particularly Docker, has grown exponentially. Despite the convenience and scalability provided by Docker, it introduces new attack surfaces and vul- nerabilities that must be managed effectively. This paper focuses on practical strategies for reducing these risks by implementing robust security practices throughout the CI/CD lifecycle. We discuss a range of hardening techniques, including reducing the image attack surface, removing unnecessary binaries, and using minimal base images. Additionally, we cover the integration of automated vulnerability scanning tools to detect and mitigate security issues early in the development process. Our proposed methodology also involves enforcing image signing, continuous compliance monitoring, and runtime protection to ensure that containerized applications remain secure in production. By incor- porating these measures, organizations can significantly enhance their security posture, minimizing the risk of potential breaches and ensuring a secure and efficient deployment pipeline for containerized applications.
Keywords: -
Paper Id: 231476
Published On: 2019-12-05
Published In: Volume 7, Issue 6, November-December 2019