Connect with us

Hi, what are you looking for?

Cyber Security

FedRAMP Outlines Requirements for Using Containers

Container technology allows operability across operating systems and faster development but is a primary security concern for implementers. 

The General Services Administration is giving cloud service providers through the end of the summer to meet security requirements for the technology they use to ease and speed up the development and deployment of software applications.

“Each FedRAMP system leveraging container technology has 1 month to provide a transition plan and 6 months from the release date of this document to transition into full compliance,” reads a document posted March 16 to the Federal Risk and Authorization Management Program blog page.

Container technology refers to an image file that contains all the information necessary to run an application including code for how it can be executed on different systems. It has enabled software developers to more quickly make and deploy applications but can also act as an attack vector for malicious hackers and was the number one security concern of 1,200 public and private-sector IT professionals in a survey published last year

Microsoft just updated its framework of ways they say attackers are increasingly targeting the technology. These can result in data destruction, resource hijacking and denial of service. One of the new tactics they warn of provides attackers the ability to access user credentials. Harvesting credentials to move further and further into victim networks has been described as a hallmark of the hacking campaign involving network management company SolarWinds.

The FedRAMP document focuses on hardening the images in line with the National Institute of Standards and Technology’s National Checklist Program; the use of automation to build, test and deploy containers; vulnerability scanning no more than 30 days out from deployment; the use of sensors; container registration and monitoring; and tracking deployed containers with asset identifiers.

Unlike all the other areas listed, which say cloud service providers “must” take certain actions, the FedRAMP document notes security sensors “may” be used alongside production containers. If independently deployed security sensors are used, they would need to have broad privileges, it says.   

“Security sensors should be run with sufficient privileges to avoid lack of visibility and false negatives,” the document reads. “If utilized, security sensors should be deployed everywhere containers execute to include within registries, as general-purpose sensors, and within [continuous integration and delivery] pipelines.” 

GSA’s other requirements also leave plenty of flexibility for cloud service providers’ implementation, noting vendors can consult with their authorizing officers on alternate ways to move forward if necessary.

“Prior to this release, the document was reviewed by Cloud Service Providers (CSPs) in a Technical Exchange Meeting and was provided to our stakeholders for public comment to ensure the guidance met CSPs’ needs,” according to the blog post.

Source: https://www.nextgov.com/cybersecurity/2021/03/fedramp-outlines-requirements-using-containers/172962/

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Cyber Security

How a cornerstone cybersecurity program has evolved from information collection to active defense. The Cybersecurity and Infrastructure Security Agency has used its Continuous Diagnostics...

Cyber Security

Cybercriminals are increasingly leveraging extreme weather events to launch attacks on critical infrastructure sectors. Cybersecurity experts say critical infrastructure operators can leverage a set...

Cyber Security

A new report says a cyber threat actor within Russia’s military intelligence service leveraged a novel malware campaign targeting Android devices used by the...

Cyber Security

Malware leveraging flaws in edge routers has been spying on military contracting websites, according to research from Lumen’s Black Lotus Labs. Malware leveraging flaws...

Copyright © 2023 Newsworthy News | Global | Political | Local | All News | Website By: Top Search SEO