Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines

Main Article Content

Arvind Kumar Bhardwaj
P.K. Dutta
Pradeep Chintale

Abstract

Integrating shift-left security practices and automated vulnerability detection in container images is imperative for modern software development, given the dynamics and vulnerability landscape. This crucial methodology emphasizes security from the initial stages of integration in container-based environments like Docker and Kubernetes. The paper examines containerization security challenges, including image vulnerabilities, insecure configurations, runtime risks, weak orchestration security, and supply chain weaknesses, while stressing compliance with regulatory rules. It explores how this automated approach leverages vulnerability detection methods integrated into Continuous Integration/Continuous Deployment (CI/CD) pipelines through static and dynamic analyses, vulnerability databases, and policy-enforcement mechanisms. Beyond identifying vulnerabilities in CI/CD pipelines, the paper outlines methods to avoid policy violations, mitigate vulnerable images, and prevent recurring practices. Importantly, it underscores the continuous enforcement and remediation of policies and security standards. Security teams must invest efforts in developing policies, automated executions, and remediation procedures, fostering cross-departmental collaboration. In essence, this proactive stance aims to enhance software security, reduce risks, and improve adherence in containerized ecosystems, making it an indispensable component of modern software development.

Downloads

Download data is not yet available.

Article Details

How to Cite
Bhardwaj, A. K., Dutta, P., & Chintale, P. (2024). Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines . Babylonian Journal of Networking, 2024, 162–170. https://doi.org/10.58496/BJN/2024/016
Section
Articles