Container Runtime Security with NeuVector

On January 3, 2024


Introduction

Containerization has become increasingly popular in modern application development and deployment, making container runtime security a crucial concern for organizations. NeuVector is a container security platform that provides comprehensive container runtime security solutions to protect containers from malicious attacks. In this blog post, we’ll explore how to integrate NeuVector with the open-source security platform Wazuh to enhance container runtime security. We’ll also discuss use cases and dashboards to monitor container security.

NeuVector is a container security platform that provides comprehensive container runtime security solutions to protect containers from malicious attacks. NeuVector integrates with container orchestration platforms like Kubernetes to provide end-to-end container security.

Architecture of Blog

• Brief introduction to container runtime security

• Overview of NeuVector and its features

• Introduction to Wazuh and its capabilities

• Integration steps from data sources end with POC

• Integration steps from Wazuh end with POC

• Use cases and dashboards to monitor container security

Integration Steps from Data Sources end with POC

The first step to integrating NeuVector with Wazuh is to configure NeuVector to send logs to Wazuh. NeuVector provides an API endpoint that can be used to forward logs to Wazuh. Follow these steps to set up the integration:

  1. Create a Wazuh agent configuration file for NeuVector.

  2. Configure NeuVector to forward logs to the Wazuh agent.

  3. Install the Wazuh agent on the same node as NeuVector.

  4. Verify that logs are being received by Wazuh.

To verify the integration, we can create a proof of concept (POC) by running a container with a known vulnerability and checking the Wazuh dashboard for alerts.

Integration Steps from Wazuh End with POC

The next step is to configure Wazuh to receive logs from NeuVector and generate alerts. Here are the steps to set up the integration:

  1. Create a new log collection rule in Wazuh to receive logs from NeuVector.

  2. Create a new rule in Wazuh to generate an alert when a container with a known vulnerability is detected.

  3. Verify that alerts are being generated in Wazuh.

To verify the integration, we can run a container with a known vulnerability and check the Wazuh dashboard for alerts.

Use cases & Dashboards

Once the integration is set up, we can leverage Wazuh’s capabilities to monitor container security. Here are some use cases and dashboards to consider:

  1. Monitor container vulnerabilities: Wazuh can detect vulnerabilities in container images and alert on new vulnerabilities as they are discovered.

  2. Detect container attacks: Wazuh can detect and alert on container attacks, including network-based attacks and privilege escalation attempts.

  3. Monitor container behavior: Wazuh can monitor container behavior, such as processes running inside containers, and alert on suspicious behavior.

  4. Dashboard for container security: Wazuh provides a dashboard that shows container security alerts and events.

Conclusion

Integrating NeuVector with Wazuh provides a powerful container runtime security solution that can detect and prevent attacks on containerized environments. By following the integration steps outlined in this blog post, organizations can benefit from the advanced security capabilities of NeuVector and the open-source security platform Wazuh. With the use cases and dashboards discussed in this post, organizations can monitor container security and respond to potential threats in a timely manner.

Container runtime security is essential to ensure that containers running in production environments are free from vulnerabilities, malware, and other potential threats. NeuVector’s container security platform provides comprehensive container runtime security solutions to protect containers from malicious attacks. NeuVector’s real-time threat detection and prevention capabilities, vulnerability scanning and management, network security, compliance management, and runtime protection capabilities make it an ideal choice for organizations looking to secure their container runtimes.


*

*

*

*