Fork me on GitHub

BuildAndDeployment -> Deployment: Usage of trusted images

Risk and Opportunity

Risk: Developers or operations might start random images in the production cluster which have malicious code or known vulnerabilities.
Opportunity: Create image assessment criteria, perform an evaluation of images and create a whitelist of artifacts/container images/virtual machine images.

Usefulness and Requirements of this Activitiy

Usefullness: Medium
Required knowledge: Very Low (one discipline)
Required time: Very Low
Required resources (systems): Very Low

Additional Information

Implementation hints:

OWASP SAMM VERSION 2

ISO27001 2017