Technology giant Google has reportedly announced to have rolled out an important update to its Cloud Build Continuous Integration/Continuous Delivery (CI/CD) software development platform. Reports cite, the update also includes automated container registry vulnerability scanning service that can scan all container images which are built using the cloud service.
The vulnerability scanning feature is designed to ensure that the containers deployed by various businesses, which are adopting the modern DevOps practices, do not contain any known vulnerabilities.
Google reportedly emphasized that the only way to make sure that the security protocols are always adhered to is by making the process automated. This is exactly why the vulnerability scanning process is automated as it will automatically scan all Cloud Build images that are created and stored in the Container Registry using the service.
According to a report by the Silicon Angle, the new vulnerability scanner essentially scans for known security threats or vulnerabilities during the initial stages of the CI/CD process to prevent any potentially corrupted images from being deployed.
For the record, the CI/CD process is a software development practice where developers maintain a common repository in which all the updated code is integrated and stored and programmers enter newly written code into the repository frequently. This method helps eliminate redundancies while allowing automated and quick roll out of software bug fixes and deployment of software updates.
The Cloud Build service currently utilizes the standard security databases to look for new issues, cite reports. The latest update reportedly allows the service to discern package vulnerabilities in Alpine, Debian and Ubuntu systems with support for RHEL and CentOS to be announced soon.
Once the service discovers an issue, it will immediately notify the user about it, however, the service can be configured using Cloud Functions and Pub/Sub notifications to take automatic actions. Users would also receive detailed reports about the severity of the shortcoming, the affected packages and the solutions available that could resolve the issue.
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.