Qualys today announced Container Runtime Security, which provides runtime defence capabilities for containerized applications.
This new approach instruments an extremely lightweight snippet of Qualys code into the container image, enabling policy-driven monitoring, detection and blocking of container behaviour at runtime. This capability eliminates the need for cumbersome management of sidecar and privileged containers by security solutions that are difficult to manage and administer on host nodes and don’t work in container-as-a-service environments. Qualys Runtime Container Security, once instrumented in the image, will work within each container irrespective of where the container is instantiated and does not need any additional administration containers. This new solution addresses, in real-time, container security use cases like critical file-access monitoring and blocking, network micro-segmentation, vulnerability and exploit mitigation, and virtual patching.
With Qualys Container Runtime Security, customers can:
• Perform comprehensive, policy-driven monitoring and blocking of container runtime behaviour including file access, network communications and process behaviours
• Create granular custom behavioural policies, use policies from the built-in policy library or automatically generate policies based on learned container behaviours
• Instrument container images in the CI/CD build pipeline with an innovative “follow the image” instrumentation approach which allows for standardized, guaranteed container runtime security across all types of container environments like Docker, Kubernetes, AWS Elastic Kubernetes Service, AWS Elastic Container Service, Azure Kubernetes Service, and Google Kubernetes Engine, as well as including container-as-a-service environments like Azure Container Instances, AWS Fargate and Google CloudRun.
Qualys Container Security solution with runtime capabilities is now available.