Blog

Sysdig and Docker Forge Alliance to Accelerate Cloud-Native Security: Docker Scout🐳
Photo by Saifeddine Rajhi

Sysdig and Docker Forge Alliance to Accelerate Cloud-Native Security: Docker Scout🐳

β€’ 6mins read
  • Docker
  • Sysdig
  • Cloud-Native Security
  • Docker Scout

    Content

    Shift Left and Shield Right with Prioritized Risk and Improved Security Posture

    πŸ‹ Introduction

    Docker and Sysdig, two leading providers of cloud-native solutions, have announced a new partnership to accelerate and secure cloud-native application delivery. The partnership integrates Sysdig runtime insights into Docker Scout, providing developers with actionable insights to prioritize risk and improve their security posture.

    This integration is a significant development for the cloud-native community, as it brings together two of the most widely used tools for container security and application delivery. Sysdig is known for its ability to provide deep visibility into containerized environments, while Docker Scout is a newly launched tool that helps developers to identify and fix security vulnerabilities in their container images.

    By combining the strengths of these two tools, Sysdig and Docker are making it easier for developers to secure their cloud-native applications throughout the entire software development lifecycle. This is especially important in today's fast-paced and ever-changing threat landscape.

    πŸ₯… Goals and Objectives

    In this blog post, we will discuss the new partnership between Sysdig and Docker, and how it will help developers to accelerate and secure cloud-native application delivery.

    scout

    ☸️ Sysdig Runtime Insights and Docker Scout

    Sysdig and Docker have jointly announced an integration at DockerCon, merging Sysdig runtime insights with Docker Scout. This collaboration aims to aid developers in prioritizing risk assessment within their CLI and simplify vulnerability identification in container-based applications. Docker Scout, an event-based tool, enhances the development process by providing integrations with Sysdig, JFrog Artifactory, AWS ECR, BastionZero, GitHub, GitLab, CircleCI, and Jenkins, optimizing DevSecOps workflows.

    Eric Carter, a senior product marketing manager at Sysdig, underscores the significance of Docker Scout as a conduit for Sysdig's container image insights through its cloud-native application protection platform (CNAPP).

    During DockerCon, Docker, Inc. made Docker Scout generally available, marking a pivotal moment in streamlining the developer's inner-loop process for creating container-based applications. The goal is to improve developer productivity, reduce post-deployment vulnerabilities, and expedite image creation, potentially saving developers up to an hour per day per project.

    Furthermore, Docker, Inc. introduced Docker Debug and an enhanced Docker Build tool, which offers substantially improved speed and allows for cloud service offloading.

    πŸ› οΈ What is Docker Scout

    Docker Scout is designed to generate actionable insights for the software supply chain. It offers a layer-by-layer view of image dependencies, vulnerabilities, comparisons, and remediation paths. Docker announced the general availability of Docker Scout this week at DockerCon. You can check out their announcement here.

    πŸ” What are Sysdig Runtime Insights

    Sysdig's deep runtime security visibility uses system calls at the kernel level to identify container activity. This is critical for threat detection but also enables Sysdig Secure to identify running containers and the packages loaded at runtime. Often, containers include packages to accommodate potential dependencies that are never used. Runtime insights help you clearly see what's in use and what's not.

    insights

    πŸ”’ Enhanced Security with Docker Scout and Sysdig

    Docker Scout and Sysdig together provide a robust solution for managing container security. By leveraging the strengths of both tools, developers can gain deeper insights into their container images and prioritize remediation efforts effectively.

    🧩 Prioritize Risks Using SBOMs and Runtime Insights

    Container images are often built from layers of other container images and software packages. These layers and packages can contain vulnerabilities that make your containers and the applications they run vulnerable to attack. Docker Scout can proactively help you find and fix these vulnerabilities, helping you create a more secure software supply chain. It does this by analyzing your images and creating a full inventory of the packages and layers called a Software Bill of Materials (SBOM). It then correlates this inventory with a continuously updated vulnerability database to identify vulnerabilities in your images.

    πŸ“œ What is SBOM?

    A Software Bill of Materials (SBOM) is key when shifting security left. SBOMs provide an artifact that contains a comprehensive list of software assets and dependencies that make up a piece of software. SBOMs are also handy for knowing details such as the licensing covering each package. In terms of security, an SBOM is key for staying on top of security risks. It helps maintain an accurate and updated correlation between package dependencies, which makes the detection task easier.

    πŸ›‘οΈ Docker Scout and Sysdig to Manage Container Security

    Docker Scout is a tool that helps Docker users manage container security. It provides a unified software analysis view to help users understand their image composition, correlates security risks with the image's SBOM, and gives contextual remediation advice. Sysdig is a container security platform that provides runtime insights into containerized applications. It can be integrated with Docker Scout to provide additional information about CVE data and in-use vulnerabilities.

    Use Case 1: CVE Data and In-Use Vulnerabilities

    Docker Scout can get CVE information from the SBOM, but it does not know which packages are actually in use. The Sysdig integration allows developers to see which CVE data impacts in-use packages, so they can prioritize remediation efforts.

    cve

    Vulnerabilities are ordered and summarized by priority, from the highest (CRITICAL) to the lowest (LOW). With the Sysdig integration, developers also get information about whether a vulnerability impacts in-use packages or not.

    vulnerabilities

    Use Case 2: Compare Vulnerabilities Between Releases

    At software development time, it is important to have visibility into the differences between the code being developed and the code that is deployed in production. Docker Scout can be used to compare a local image to an image that is currently running in a cluster, and to identify any vulnerabilities that exist in the newer image but not in the older image. This information can then be used to prioritize remediation efforts and to minimize security blind spots in production. In addition to identifying new vulnerabilities, the "compare" approach can also be used to identify packages that are no longer in use. These packages can then be removed from the image, which can help to reduce the attack surface and make the image more lean and efficient.

    compare

    Use Case 3: View Image Insights in Your CI/CD Pipeline

    Docker Scout can be integrated into the CI/CD pipeline workflow to get vulnerability and runtime insights when building and pushing images. This can be done using a variety of CI/CD tools, including GitHub, GitLab, CircleCI, Microsoft Azure DevOps Pipelines, and Jenkins. Specifically for GitHub, Docker Scout can be integrated using the popular Docker Build and Push GitHub Action. This action allows developers to build and push images to Docker Hub from their GitHub workflows.

    πŸ› οΈ View and Manage Security Issues

    Docker Scout results can be viewed and managed across various interfaces, including Docker Desktop, the Docker CLI, Docker Hub, and the Docker Scout Dashboard. The Docker Scout Dashboard provides a unified view of discovered vulnerabilities, as well as extended information about CVEs and recommendations on how to remediate them by updating to a different base image. The Docker Scout Dashboard web console gives developers a view into discovered vulnerabilities but also provides extended information about CVEs along with recommendations on how to bypass vulnerabilities by updating to a different base image.

    issues

    πŸš€ Ship More Secure Images

    The ability to compare images during the build phase with those running in production gives developers a new lens to help build better images. Beyond remediating in-use vulnerabilities, teams can see which packages are unused and consider if they can be removed to address "container bloat." Leaner container images have a reduced attack surface with the added benefit of being able to scale more quickly.

    🏁 Conclusion

    It is essential to identify, prioritize, and fix security issues across the software supply chain in order to avoid security breaches when software is released into production. Docker and Sysdig help teams to do this more effectively by providing real-time security information throughout the development and deployment process. The integration of Sysdig Secure and Docker Scout offers users new and powerful ways to stay on top of known CVEs and ensure the security of their software supply chain.


    Until next time, ぀γ₯く πŸŽ‰

    πŸ’‘ Thank you for Reading !! πŸ™ŒπŸ»πŸ˜πŸ“ƒ, see you in the next blog.🀘 Until next time πŸŽ‰

    πŸš€ Thank you for sticking up till the end. If you have any questions/feedback regarding this blog feel free to connect with me:

    ♻️ LinkedIn: https://www.linkedin.com/in/rajhi-saif/

    ♻️ X/Twitter: https://x.com/rajhisaifeddine

    The end ✌🏻

    πŸ”° Keep Learning !! Keep Sharing !! πŸ”°

    πŸ“… Stay updated

    Subscribe to our newsletter for more insights on AWS cloud computing and containers.