Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by EM360Tech. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by EM360Tech or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Container Security Uncovered: Lessons from NIST SP 800-190

23:10
 
Share
 

Manage episode 508373059 series 2948336
Content provided by EM360Tech. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by EM360Tech or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

It has been eight years since the NIST Special Publication 800-190: Application Container Security Guide was published, and its recommendations remain central to container security today. As cloud-native applications have become the foundation of modern enterprise IT, securing containers has shifted from an afterthought to a critical priority.

In this episode, Richard Stiennon, Chief Research Analyst at IT-Harvest and host of Security Strategist, discusses container security with John Morello, CTO and Co-Founder of Minimus, and Murugiah Souppaya, Former Computer Scientist at the National Institute of Standards and Technology (NIST). Together, they focus on NIST Special Publication 800-190, exploring its role in providing best practices for securing containers, the recommendations outlined in the guide, and the approach required for effective container security.

The conversation also examines current best practices and the future of container security, emphasizing the importance of compliance and the integration of security throughout the development lifecycle.

Why NIST SP 800-190 Still Matters

NIST’s framework was designed for both government and industry, offering guidance on how to:

  • Integrate security early in the application lifecycle.
  • Apply a holistic approach from hardware to workload.
  • Build with minimalistic and secure container images.
  • Maintain compliance with regulations and standards.
  • Continuously monitor and update security practices.
  • Understand the full container lifecycle from creation to retirement.

As Murugiah Souppaya explains:

“We want to make sure that people think of container security holistically, and also think about the full lifecycle management of the container itself. Like anything else in the enterprise, you want to look at this end-to-end and fill those gaps.”

Insights on the Development of Container Security

NIST SP 800-190 arrived at a time when containers were new to most organizations. Now, they have become the standard way to deploy applications at scale.

John Morello recalls:

“Around 2016 or so, containers were pretty new in the world. Containers and containerization in other forms had existed in the past, but it was really becoming a mainstream technology that was commonly used across many organizations.”

This fast-paced adoption forced organizations to rethink their security culture. Containers required not only new technical controls, but also a shift in mindset: security had to be built-in from the start.

Takeaways

  • Container security became critical with the rise of cloud-native applications.
  • NIST aims to provide guidance for both government and industry.
  • The 800-190 guide offers a framework for securing containers.
  • Security must be integrated early in the application lifecycle.
  • Containers require a shift in security culture and practices.
  • Holistic security involves securing hardware to workload.
  • Best practices include using minimalistic and secure images.
  • Compliance with regulations is essential for container security.
  • Continuous monitoring and updating of security practices are necessary.
  • Understanding the full lifecycle of containers is crucial for security.

Chapters

00:00 Introduction to Container Security and NIST 800-190

02:58 The Importance of NIST in Container Security

05:52 Key Recommendations from the NIST Guide

08:44 Holistic Approach to Container Security

11:53 Current Best Practices in Container Security

14:47 Future of Container Security and Continuous Improvement

About Minimus

Minimus solves the endless treadmill of cloud software vulnerabilities by simply preventing them from existing. Minimus provides secure, minimal container and VM images, rebuilt from scratch daily to eliminate over 95% of CVEs.Founded by the team behind container security pioneer Twistlock, Minimus raised $51 million seed funding from YL Ventures and Mayfield. The company is headquartered in Baton Rouge with offices in New York, Tel Aviv, and Portland, OR. To learn more, visit minimus.io.

  continue reading

174 episodes

Artwork
iconShare
 
Manage episode 508373059 series 2948336
Content provided by EM360Tech. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by EM360Tech or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

It has been eight years since the NIST Special Publication 800-190: Application Container Security Guide was published, and its recommendations remain central to container security today. As cloud-native applications have become the foundation of modern enterprise IT, securing containers has shifted from an afterthought to a critical priority.

In this episode, Richard Stiennon, Chief Research Analyst at IT-Harvest and host of Security Strategist, discusses container security with John Morello, CTO and Co-Founder of Minimus, and Murugiah Souppaya, Former Computer Scientist at the National Institute of Standards and Technology (NIST). Together, they focus on NIST Special Publication 800-190, exploring its role in providing best practices for securing containers, the recommendations outlined in the guide, and the approach required for effective container security.

The conversation also examines current best practices and the future of container security, emphasizing the importance of compliance and the integration of security throughout the development lifecycle.

Why NIST SP 800-190 Still Matters

NIST’s framework was designed for both government and industry, offering guidance on how to:

  • Integrate security early in the application lifecycle.
  • Apply a holistic approach from hardware to workload.
  • Build with minimalistic and secure container images.
  • Maintain compliance with regulations and standards.
  • Continuously monitor and update security practices.
  • Understand the full container lifecycle from creation to retirement.

As Murugiah Souppaya explains:

“We want to make sure that people think of container security holistically, and also think about the full lifecycle management of the container itself. Like anything else in the enterprise, you want to look at this end-to-end and fill those gaps.”

Insights on the Development of Container Security

NIST SP 800-190 arrived at a time when containers were new to most organizations. Now, they have become the standard way to deploy applications at scale.

John Morello recalls:

“Around 2016 or so, containers were pretty new in the world. Containers and containerization in other forms had existed in the past, but it was really becoming a mainstream technology that was commonly used across many organizations.”

This fast-paced adoption forced organizations to rethink their security culture. Containers required not only new technical controls, but also a shift in mindset: security had to be built-in from the start.

Takeaways

  • Container security became critical with the rise of cloud-native applications.
  • NIST aims to provide guidance for both government and industry.
  • The 800-190 guide offers a framework for securing containers.
  • Security must be integrated early in the application lifecycle.
  • Containers require a shift in security culture and practices.
  • Holistic security involves securing hardware to workload.
  • Best practices include using minimalistic and secure images.
  • Compliance with regulations is essential for container security.
  • Continuous monitoring and updating of security practices are necessary.
  • Understanding the full lifecycle of containers is crucial for security.

Chapters

00:00 Introduction to Container Security and NIST 800-190

02:58 The Importance of NIST in Container Security

05:52 Key Recommendations from the NIST Guide

08:44 Holistic Approach to Container Security

11:53 Current Best Practices in Container Security

14:47 Future of Container Security and Continuous Improvement

About Minimus

Minimus solves the endless treadmill of cloud software vulnerabilities by simply preventing them from existing. Minimus provides secure, minimal container and VM images, rebuilt from scratch daily to eliminate over 95% of CVEs.Founded by the team behind container security pioneer Twistlock, Minimus raised $51 million seed funding from YL Ventures and Mayfield. The company is headquartered in Baton Rouge with offices in New York, Tel Aviv, and Portland, OR. To learn more, visit minimus.io.

  continue reading

174 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play