본문 바로가기
  • Home

A Study on Pipeline Design Methods for Providing Secure Container Image Registry

  • Journal of Internet of Things and Convergence
  • Abbr : JKIOTS
  • 2023, 9(3), pp.21-26
  • DOI : 10.20465/KIOTS.2023.9.3.021
  • Publisher : The Korea Internet of Things Society
  • Research Area : Engineering > Computer Science > Internet Information Processing
  • Received : March 26, 2023
  • Accepted : May 29, 2023
  • Published : June 30, 2023

Seong-Jae Ko 1 Kim Sun Jib 2

1씨엠티정보통신 책임컨설턴트
2한세대학교

Accredited

ABSTRACT

The development and distribution approach of applications is transitioning from a monolithic architecture to microservices and containerization, a lightweight virtualization technology, is becoming a core IT technology. However, unlike traditional virtual machines based on hypervisors, container technology does not provide concrete security boundaries as it shares the same kernel. According to various preceding studies, there are many security vulnerabilities in most container images that are currently shared. Accordingly, attackers may attempt exploitation by using security vulnerabilities, which may seriously affect the system environment. Therefore, in this study, we propose an efficient automated deployment pipeline design to prevent the distribution of container images with security vulnerabilities, aiming to provide a secure container environment. Through this approach, we can ensure a safe container environment.

Citation status

* References for papers published after 2023 are currently being built.