GRYPE VULNERABILITY SCANNER FOR CONTAINERS
DOI:
https://doi.org/10.24867/20BE07TrajkovicKeywords:
information security, vulnerability, container, GrypeAbstract
In this paper is described the importance of continuously providing security in containers and reducing the risk of unwanted application attacks. Emphasis is placed on the Grype scanner, which examines vulnerabilities in containers.
References
[1] Ebert, Christof, et al. "DevOps." Ieee Software 33.3, 2016, стр. 94-100.
[2] Qadir, Suhail, and S. M. K. Quadri. "Information availability: An insight into the most important attribute of information security." Journal of Information Security 7.3, 2016, стр. 185-194.
[3] OWASP TOP TEN, https://owasp.org/www-project-top-ten/ ( Последњи приступ август 2022.)
[4] Grype, https://github.com/anchore/grype ( Последњи приступ август 2022.)
[5] Kemmerer, Richard A. "Cybersecurity." 25th International Conference on Software Engineering, 2003. Proceedings.. IEEE, 2003.
[6] Sharma, Prateek, et al. "Containers and virtual machines at scale: A comparative study." Proceedings of the 17th international middleware conference, 2016.
[7] Agarwal, Gaurav. Modern DevOps Practices, 2021, стр. 28
[8] Abbott, Brendan Michael. A security evaluation methodology for container images, 2017
[9] Jagelid, Michelle. "Container Vulnerability Scanners: An Analysis.", 2020, стр. 24
[2] Qadir, Suhail, and S. M. K. Quadri. "Information availability: An insight into the most important attribute of information security." Journal of Information Security 7.3, 2016, стр. 185-194.
[3] OWASP TOP TEN, https://owasp.org/www-project-top-ten/ ( Последњи приступ август 2022.)
[4] Grype, https://github.com/anchore/grype ( Последњи приступ август 2022.)
[5] Kemmerer, Richard A. "Cybersecurity." 25th International Conference on Software Engineering, 2003. Proceedings.. IEEE, 2003.
[6] Sharma, Prateek, et al. "Containers and virtual machines at scale: A comparative study." Proceedings of the 17th international middleware conference, 2016.
[7] Agarwal, Gaurav. Modern DevOps Practices, 2021, стр. 28
[8] Abbott, Brendan Michael. A security evaluation methodology for container images, 2017
[9] Jagelid, Michelle. "Container Vulnerability Scanners: An Analysis.", 2020, стр. 24
Downloads
Published
2022-11-02
Issue
Section
Electrotechnical and Computer Engineering