SHARE
Facebook X Pinterest WhatsApp

CoreOS Unveils Security Framework for Containers

10 Security Trends to Look for in 2016 Moving to address security concerns that have dogged the usage of containers in production environments, CoreOS today unveiled a Distributed Trusted Computing framework giving enterprises cryptographically guaranteed end-to-end integrity and control of their environment. Announced at a Tectonic Summit 2015 conference, the framework is designed to support […]

Written By
MV
Mike Vizard
Dec 2, 2015
Slide Show

10 Security Trends to Look for in 2016

Moving to address security concerns that have dogged the usage of containers in production environments, CoreOS today unveiled a Distributed Trusted Computing framework giving enterprises cryptographically guaranteed end-to-end integrity and control of their environment.

Announced at a Tectonic Summit 2015 conference, the framework is designed to support both Rkt containers as well as Docker images running on top of Rkt containers.

CoreOS CEO Alex Polvi says that one of the primary reasons that CoreOS decided to create its own containers format was to be able to provide levels of security assurance that were not being addressed by Docker containers. Since the launch of that initiative, the two main container camps have agreed on a way to move Docker images between their respective container formats.

Core capabilities of the Distributed Trusted Computing framework include the ability to verify that rkt is configured in a secure manner. Only containers signed with trusted keys are allowed to run on the cluster. Additionally, rkt uses the Trusted Platform Module (TPM) to create a cryptographically verifiable audit log of which containers have run on the system.

Finally, the CoreOS operating system is verified before boot to ensure that it has not been modified all the way down to the hardware or cloud service provider level. If it has been modified, Polvi says, it will not boot. Only machines that are booted through this entire process are allowed into the Kubernetes cluster. SSL private keys are distributed only when the machine has been verified to be in a trusted state. Those new capabilities complement Quay, a vulnerability scanning tool that CoreOS unveiled last month that is based on an open source project called Clair.

Many IT organizations have been reluctant to deploy production applications based on containers because of security concerns. In fact, to alleviate this issue, many IT organizations opt to deploy containers on top of virtual machines. But Polvi notes that, once container security issues are addressed, CoreOS expects to see the number of containers deployed on top of bare-metal servers substantially increase.

In general, containers provider a lighter-weight approach to virtualization that is easier for developers to work with while simultaneously increasing the utilization rates of servers. The degree to which containers, as part of emerging microservices architectures, will replace traditional virtual machines in the enterprise is subject to debate. What is certain is that as containers begin to proliferate across the enterprise, just about everything they interact with will to one degree or another be changed.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top ETL Tools 2022
Collins Ayuya
Jul 14, 2022
Snowflake vs. Databricks: Big Data Platform Comparison
Surajdeep Singh
Jul 14, 2022
Identify Where Your Information Is Vulnerable Using Data Flow Diagrams
Jillian Koskie
Jun 22, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.