Supercharge Your Innovation With Domain-Expert AI Agents!

Detecting security risks related to a software component

A security risk, software component technology, used in computer security devices, instruments, computing, etc.

Pending Publication Date: 2021-05-28
IBM CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Some embodiments of the present invention solve the technical problem of improving the operating efficiency of a container-based operating environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detecting security risks related to a software component
  • Detecting security risks related to a software component
  • Detecting security risks related to a software component

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Aspects of the present disclosure relate generally to the field of digital computer systems, and more particularly to methods for detecting security risks associated with software components to be deployed in container-based runtime environments. While the present disclosure is not necessarily limited to such applications, various aspects of the disclosure can be appreciated through a discussion of different examples using this context.

[0013] Some embodiments of the method may enable detection of security exposures at runtime when the container is instantiated without installing any agents inside the container. Some embodiments of the method may prevent the use of proxies inside the container, and thus may allow inspection of the container without compromising the lightweight design of the container and without running multiple competing processes / agents inside the container. Based on the detected exposure, appropriate actions can be taken to manage the container (an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure relates to related methods, systems, and media containing instructions for detecting security risks related to a software component deployable in a container-based runtime environment. The method comprises receiving a trigger, the trigger indicating that a layer of a container within the container-based runtime environment is to be checked for security risks. A check layer of the container is identified that is to be checked for security risks. A determination is made that a check for security risks has not been previously performed for the check layer according to a check criterion, and responsive to this determination, a determination is made that a security analysis indicates a security risk. Responsive to this determination, a remedial action may be initiated.

Description

technical field [0001] The present disclosure relates generally to the field of digital computer systems, and more particularly to a method for detecting security risks associated with software components to be deployed in a container-based runtime environment. Background technique [0002] Due to technological developments, resource virtualization techniques have become prominent. A user's computer frequently contains products available in a virtualized environment in addition to common native applications installed. These virtual environments can be visible in a computer's desktop and can be grouped into categories such as virtual machines, containers, and virtual appliances. However, container monitoring is a challenging task. Contents of the invention [0003] Some embodiments of the present invention solve the technical problem of improving the operating efficiency of a container-based operating environment. The technical solutions disclosed herein provide a system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/50
CPCG06F21/577G06F2221/033
Inventor G·西亚诺L·皮切蒂
Owner IBM CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More