Container security on IBM Cloud

By Eric Carter - DECEMBER 17, 2022

SHARE:

Facebook logo LinkedIn logo X (formerly Twitter) logo
container security on IBM Cloud

If you’re running containers and Kubernetes on IBM Cloud, you can enable the key security workflows of Sysdig for your IBM Cloud deployments. The IBM Security and Compliance Center (SCC) Workload Protection service based on Sysdig makes it easier for you to implement policies and safeguards to secure your containers and your Kubernetes in the cloud. With it, you’ll be able to secure your build pipeline, detect and respond to runtime threats, and validate compliance across your containers and Kubernetes infrastructure.

What container security workflows are available on IBM Cloud?

IBM SCC Workload Protection provides security across the life cycle for containers, Kubernetes and cloud services. The security capabilities available to you on IBM Cloud span four key practices:

  • Secure Build Pipelines: Scan images for vulnerabilities and misconfigurations
  • Manage Posture and Compliance: Identify and address misconfigurations
  • Detect Runtime Threats: Get real-time visibility to detect production threats
  • Respond Rapidly: Capture detailed insights to speed incident response and forensics

Each of these areas provide a range of capabilities that not only help you manage risk, but also block threats, and enable you to better meet compliance requirements for your business. You’ll be able to see inside containers and better handle the dynamic nature of Kubernetes at scale.

Let’s get slightly more specific into a few of the features that you can integrate into your DevOps workflow on IBM Cloud to secure your environment:

Action Descripion
Scan container images Trigger image scans and set policies to analyze images within your CI/CD pipeline and repositories to identify known vulnerabilities and violations. Check against specific compliance controls such as PCI and NIST.
Monitor CVEs for running containers Identify new vulnerabilities in running containers without rescanning images.
Configure alert channels Set up notification channels (e.g., PagerDuty, Slack, etc.) to get security event alerts and take action.
Set image scanning alerts Receive alerts about new images, scan results, and new CVEs. Get notified if a running image is impacted by newly discovered vulnerabilities.
Enable runtime security policies Configure detection policies to identify and respond to anomalous runtime container activity. Verify container compliance and implement file integrity monitoring. Create your own custom policies based on Falco rules.
Run compliance tasks Monitor the configuration of your environment compared to CIS benchmarks and best practices. Use compliance dashboards and metrics to visualize progress.
Audit activity Filter user and service interactions to accelerate incident response. Perform forensics to understand security breaches, meet compliance requirements, and recover quickly.

All of the security features for container, Kubernetes, and cloud are integrated and available through an easy-to-use web UI.

Sysdig Secure runtime security event monitoring

Application development has transformed CI/CD, containers and open source. If you find yourself struggling with how – and where – to enable security controls for your containers, Kubernetes, and cloud, check out what the IBM SCC Workload Protection service has to offer. One place to start is to read our Kubernetes Security Guide.

Getting started on IBM Cloud

The IBM SCC Workload Protection solution based on Sysdig is available globally in 10+ regions. If you’re looking to jump right in, check out the Getting started page that outlines the steps to deploying an instance. You can get going in a few simple steps, which typically takes only a few minutes.

Don’t have an IBM Cloud account? You can create an account and get started today!

Subscribe and get the latest updates