바로가기메뉴

본문 바로가기 주메뉴 바로가기

A Study on Pipeline Design Methods for Providing Secure Container Image Registry

Journal of The Korea Internet of Things Society / Journal of The Korea Internet of Things Society, (P)2799-4791;
2023, v.9 no.3, pp.21-26
https://doi.org/10.20465/KIOTS.2023.9.3.021


Abstract

The development and distribution approach of applications is transitioning from a monolithic architecture to microservices and containerization, a lightweight virtualization technology, is becoming a core IT technology. However, unlike traditional virtual machines based on hypervisors, container technology does not provide concrete security boundaries as it shares the same kernel. According to various preceding studies, there are many security vulnerabilities in most container images that are currently shared. Accordingly, attackers may attempt exploitation by using security vulnerabilities, which may seriously affect the system environment. Therefore, in this study, we propose an efficient automated deployment pipeline design to prevent the distribution of container images with security vulnerabilities, aiming to provide a secure container environment. Through this approach, we can ensure a safe container environment.

keywords
Cloud, Microservices, Container, Hypervisor, Pipeline, 클라우드, 마이크로서비스, 컨테이너, 하이퍼바이저, 파이프라인

Journal of The Korea Internet of Things Society