Home Applications AWS Container Threats – How to Detect Threats in the Public Cloud

AWS Container Threats – How to Detect Threats in the Public Cloud

AWS Container Threats – How to Detect Threats in the Public Cloud

Today more and more applications are running in a public cloud in containers. A common question we hear is “Do AWS container threats exist and how can we detect them?” For the application administrator or a security team, it is always interesting to know what and how their containers look like from security point of view.

The recent ransomware issues with MongoDB and Elasticsearch are not the only AWS container threats to worry about. It is important to have visibility into how containers are working and the details of their network connections.

We did some simple tests on AWS using a test application and captured some real-world threat examples to show how containers are just as vulnerable as any other application infrastructure. We deployed several application containers in an AWS ECS test environment. We used the standard configuration and turned on platform security features such as security groups. Only one publicly facing port was opened for each of application. For example, port 1080 was opened for an NGINX container which served as a load balancer for the application’s HTTP web requests. Then we deployed the NeuVector security containers, set the system in protect mode, and left the application running for a few days. This is the automatically generated network map and application segmentation created.

Read the entire article here, AWS Container Threats – How to Detect Threats in the Public Cloud

via NeuVectdor.

NeuVector NeuVector was founded by security and enterprise software veterans with the vision of simple, scalable security for container based applications. The team has over 20 years of security, virtualization, and enterprise software experience from companies such as VMWare, Fortinet, Cisco, and Trend Micro.

Featured Resources:

Related Articles:


White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]


      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors