Virtualization Technology News and Information
Article
RSS
NRI Secure Launches Japan's First IT Security Assessment Service for Container Orchestration

NRI SecureTechnologies, Ltd. launched Japan's first IT security assessment service for systems with container orchestration, that uses the leading container orchestration tool "Kubernetes."

This service provides IT security assessment for a system using container orchestration technology from the viewpoints of both "static analysis" by interpreting configuration files, and "dynamic analysis" by attempting simulated attacks. The assessment consists of manual inspection by engineers of NRI Secure who have expert knowledge of container orchestration as well as several tests using auxiliary inspection tools. This service detects security issues by checking the validity of the information on the configuration file, and the architecture configuration generated by container orchestration.

In addition to the independent inspection of each configuration file, a comprehensive and highly accurate assessment is performed to check whether the configuration state is appropriate or not by looking at the entire architecture. This enables us to detect security issues at the design phase that are often overlooked by the inspection tool alone.

Followed by Kubernetes, NRI Secure plans to add more container orchestration tools to the scope of this IT security assessment service.

In recent years, as DX (digital transformation) has become more widespread, the need for greater flexibility and speed in system development has increased, and the design concepts and infrastructure technologies that support these requirements have been rapidly evolving. In particular, microservice, which develops applications by splitting them into services and functions, and other system development that presuppose deployment of cloud-native and serverless architectures are becoming more common.

One of the technologies that underpin these architectures is an application execution environment called a container. The emergence of container orchestration tools that automatically deploy, scale, and so on has increased the adoption of containers when building systems.

On the other hand, since containers are a new technology area, there is a high possibility that the system is operating with a weak configuration since security measures are not yet fully in place. To deal with increasingly intense cyber threats and attacks, it is necessary to take appropriate security measures, such as access and privilege management, with a view to the entire system architecture, as well as vulnerability measures for the container itself.

NRI Secure will continue to provide various products and services in response to trends and threats of the times for supporting companies and organizations in their information security measures, contributing to promoting digital transformation for a safe and secure society.

Published Tuesday, December 03, 2019 6:02 AM by David Marshall
Filed under: ,
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
top25
Calendar
<December 2019>
SuMoTuWeThFrSa
24252627282930
1234567
891011121314
15161718192021
22232425262728
2930311234