{"id":503,"date":"2021-06-25T11:15:43","date_gmt":"2021-06-25T03:15:43","guid":{"rendered":"https:\/\/choson.lifenet.com.tw\/?p=503"},"modified":"2023-03-29T16:43:55","modified_gmt":"2023-03-29T08:43:55","slug":"%e5%ae%b9%e5%99%a8%e5%8c%96%e7%9a%84%e5%ae%89%e5%85%a8%e5%8e%9f%e5%89%87the-security-principles-of-containerization","status":"publish","type":"post","link":"https:\/\/choson.lifenet.com.tw\/?p=503","title":{"rendered":"\u5bb9\u5668\u5316\u7684\u5b89\u5168\u539f\u5247(the security principles of containerization)"},"content":{"rendered":"\n<p><img decoding=\"async\" src=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210625\/20132160Q6Ws7TAFVV.jpg\" alt=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210625\/20132160Q6Ws7TAFVV.jpg\"><br>-\u5bb9\u5668\u6280\u8853\u67b6\u69cb<br>\u5bb9\u5668\u6620\u50cf\u662f\u7531\u958b\u767c\u4eba\u54e1\u5275\u5efa\u548c\u8a3b\u518a\u7684\u5305\uff0c\u5176\u4e2d\u5305\u542b\u5728\u5bb9\u5668\u4e2d\u904b\u884c\u6240\u9700\u7684\u6240\u6709\u6587\u4ef6\uff0c\u901a\u5e38\u6309\u5c64\u7d44\u7e54\u3002\u6620\u50cf\u901a\u5e38\u5305\u62ec\u5c64\uff0c\u4f8b\u5982\u6700\u5c0f\u64cd\u4f5c\u7cfb\u7d71\u6838\u5fc3\uff08\u53c8\u540d\u57fa\u790e\u5c64\uff09\u3001\u61c9\u7528\u7a0b\u5e8f\u6846\u67b6\u548c\u81ea\u5b9a\u7fa9\u4ee3\u78bc\u3002<br>\u5118\u7ba1\u4e3b\u6a5f\u53ef\u4ee5\u76f4\u63a5\u806f\u7e6b\u8a3b\u518a\u4e2d\u5fc3\u7372\u53d6\u93e1\u50cf\u4e26\u5c07\u5176\u90e8\u7f72\u5230\u5bb9\u5668\u4e2d\uff0c\u4f46\u5354\u8abf\u5668\uff08\u4f8b\u5982Kubernetes\uff08K8S\uff09\u3001Docker Swarm\u3001Mesos\u7b49\uff09\u53ef\u4ee5\u81ea\u52d5\u57f7\u884c\u90e8\u7f72\u904e\u7a0b\uff0c\u5f9e\u8a3b\u518a\u4e2d\u5fc3\u62c9\u53d6\u93e1\u50cf\uff0c\u4e26\u5c07\u5176\u90e8\u7f72\u5230\u5bb9\u5668\u4e2d\uff0c\u4e26\u7ba1\u7406\u5bb9\u5668\u904b\u884c\u6642\u3002<\/p>\n\n\n\n<p><strong>\u4e0d\u8b8a\u6027\u548c\u5f48\u6027(Immutability and Elasticity)<\/strong><br>\u6b63\u5982<a href=\"https:\/\/hub.packtpub.com\/pets-cattle-analogy-demonstrates-how-serverless-fits-software-infrastructure-landscape\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5bf5\u7269\u4e2d<\/a>\u7684\u96de\u3001<a href=\"https:\/\/hub.packtpub.com\/pets-cattle-analogy-demonstrates-how-serverless-fits-software-infrastructure-landscape\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u725b\u3001\u96de\u548c\u6606\u87f2\u985e\u6bd4<\/a>\uff0c\u90e8\u7f72\u5bb9\u5668\u662f\u70ba\u4e86\u5f48\u6027\uff0c\u5177\u6709\u81ea\u52d5\u201c\u6a6b\u5411\u64f4\u5c55\u201d\u548c\u201c\u7e31\u5411\u64f4\u5c55\u201d\u7684\u80fd\u529b\u3002<br>\u6211\u5011\u5f88\u597d\u5730\u7167\u9867\u6211\u5011\u7684\u5bf5\u7269\uff0c\u4f46\u6bba\u6b7b\u548c\u5403\u6389\u50cf\u725b\u548c\u96de\u9019\u6a23\u7684\u52d5\u7269\u800c\u4e0d\u6703\u5f8c\u6094\u3002\u865b\u64ec\u6a5f\u548c\u5bb9\u5668\u662f\u53ef\u4ee5\u96a8\u6642\u92b7\u6bc0\u3001\u66ff\u63db\u548c\u6dfb\u52a0\u7684\u5de5\u4f5c\u8ca0\u8f09\u3002\u4e0d\u8b8a\u6027\u548c\u7121\u72c0\u614b\u662f\u5bb9\u5668\u5be6\u73fe\u5f48\u6027\u7684\u5169\u500b\u95dc\u9375\u5c6c\u6027\u3002<\/p>\n\n\n\n<p>\u4e0d\u8b8a\u6027\u610f\u5473\u8457\u201c\u96a8\u6642\u9593\u4e0d\u8b8a\u6216\u7121\u6cd5\u6539\u8b8a\u201d\u3002(Google) \u6211\u5011\u53ef\u4ee5\u5c07\u5bb9\u5668\u8996\u70ba\u53ea\u8b80\u7684\uff1b\u66f4\u65b0\u5bb9\u5668\u7684\u552f\u4e00\u65b9\u6cd5\u662f\u7528\u65b0\u5bb9\u5668\u66ff\u63db\u5b83\u3002\u7121\u72c0\u614b\u610f\u5473\u8457\u5bb9\u5668\u4e0d\u6703\u5728\u5176\u672c\u5730\u5b58\u5132\u4e2d\u4fdd\u7559\u6578\u64da\uff1b\u4f46\u662f\uff0c\u9060\u7a0b\u5b58\u5132\u5eab\u7528\u65bc\u8de8\u5bb9\u5668\u6301\u4e45\u5316\u548c\u5171\u4eab\u72c0\u614b\u3002<br>\u5927\u591a\u6578\u61c9\u7528\u7a0b\u5e8f\u5bb9\u5668\u6280\u8853\u90fd\u5be6\u73fe\u4e86\u4e0d\u8b8a\u6027\u7684\u6982\u5ff5\u3002\u63db\u53e5\u8a71\u8aaa\uff0c\u5bb9\u5668\u672c\u8eab\u61c9\u8a72\u4f5c\u70ba\u5df2\u90e8\u7f72\u4f46\u672a\u66f4\u6539\u7684\u7121\u72c0\u614b\u5be6\u9ad4\u904b\u884c\u3002\u7576\u6b63\u5728\u904b\u884c\u7684\u5bb9\u5668\u9700\u8981\u5347\u7d1a\u6216\u66f4\u6539\u5176\u5167\u5bb9\u6642\uff0c\u5b83\u6703\u88ab\u7c21\u55ae\u5730\u92b7\u6bc0\u4e26\u66ff\u63db\u70ba\u5177\u6709\u66f4\u65b0\u7684\u65b0\u5bb9\u5668\u3002<br>\u8cc7\u6599\u4f86\u6e90\uff1a&nbsp;<a href=\"https:\/\/www.nist.gov\/publications\/application-container-security-guide\" target=\"_blank\" rel=\"noreferrer noopener\">NIST SP 800-192<\/a><\/p>\n\n\n\n<p><strong>\u8986\u84cb\u7db2\u7d61(Overlay Networks)<\/strong><br>\u8986\u84cb\u7db2\u7d61\u901a\u5e38\u7528\u65bc\u9694\u96e2\u7bc0\u9ede\u4e4b\u9593\u7684\u6d41\u91cf\u3002\u76f8\u53cd\uff0c\u53ef\u80fd\u6703\u5c0e\u81f4\u975e\u5bb9\u5668\u611f\u77e5\u9632\u79a6\u5de5\u5177\u96e3\u4ee5\u76e3\u63a7\u6d41\u91cf\u3002<\/p>\n\n\n\n<p><strong>\u5c0d\u5bb9\u5668\u9032\u884c\u5206\u6bb5\u548c\u5206\u7d44(Segmenting and Grouping Containers)<\/strong><br>\u5728\u67d0\u4e9b\u60c5\u6cc1\u4e0b\uff0c\u9069\u5408\u5c07\u5177\u6709\u76f8\u540c\u7528\u9014\u3001\u654f\u611f\u6027\u548c\u5a01\u8105\u614b\u52e2\u7684\u5bb9\u5668\u5206\u7d44\u5728\u55ae\u500b\u4e3b\u6a5f\u4e0a\u3002\u5118\u7ba1\u5982\u6b64\uff0c\u5b83\u4e26\u4e0d\u9069\u7528\u65bc\u6240\u6709\u4e0d\u5177\u6709\u76f8\u540c\u5b89\u5168\u8981\u6c42\u7684\u5bb9\u5668\u3002<br>\u50c5\u5c07\u5177\u6709\u76f8\u540c\u7528\u9014\u3001\u654f\u611f\u6027\u548c\u5a01\u8105\u614b\u52e2\u7684\u5bb9\u5668\u5206\u7d44\u5230\u55ae\u500b\u4e3b\u6a5f\u64cd\u4f5c\u7cfb\u7d71\u5167\u6838\u4e0a\uff0c\u4ee5\u5be6\u73fe\u984d\u5916\u7684\u7e31\u6df1\u9632\u79a6\u3002<br>\u6309\u7528\u9014\u3001\u654f\u611f\u6027\u548c\u5a01\u8105\u614b\u52e2\u5206\u5272\u5bb9\u5668\u63d0\u4f9b\u4e86\u984d\u5916\u7684\u7e31\u6df1\u9632\u79a6\u3002\u9019\u7a2e\u5206\u6bb5\u53ef\u4ee5\u901a\u904e\u4f7f\u7528\u591a\u500b\u7269\u7406\u670d\u52d9\u5668\u4f86\u63d0\u4f9b\uff0c\u4f46\u73fe\u4ee3\u865b\u64ec\u6a5f\u7ba1\u7406\u7a0b\u5e8f\u4e5f\u63d0\u4f9b\u4e86\u8db3\u5920\u5f37\u5927\u7684\u9694\u96e2\u4f86\u6709\u6548\u5730\u964d\u4f4e\u9019\u4e9b\u98a8\u96aa\u3002<br>\u8cc7\u6599\u4f86\u6e90\uff1a&nbsp;<a href=\"https:\/\/www.nist.gov\/publications\/application-container-security-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">NIST SP 800-192<\/a><\/p>\n\n\n\n<p><strong>NIST \u61c9\u7528\u7a0b\u5e8f\u5bb9\u5668\u5b89\u5168\u6307\u5357(NIST Application Container Security Guide)<\/strong><br>NIST \u5efa\u8b70\u7d44\u7e54\u61c9\u9075\u5faa\u4ee5\u4e0b\u5efa\u8b70\uff0c\u4ee5\u5e6b\u52a9\u78ba\u4fdd\u5176\u5bb9\u5668\u6280\u8853\u5be6\u65bd\u548c\u4f7f\u7528\u7684\u5b89\u5168\u6027\uff1a<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>\u5b9a\u5236\u7d44\u7e54\u7684\u904b\u71df\u6587\u5316\u548c\u6280\u8853\u6d41\u7a0b\uff0c\u4ee5\u652f\u6301\u5bb9\u5668\u4f7f\u958b\u767c\u3001\u904b\u884c\u548c\u652f\u6301\u61c9\u7528\u7a0b\u5e8f\u6210\u70ba\u53ef\u80fd\u7684\u65b0\u65b9\u5f0f\u3002<\/li>\n\n\n\n<li>\u4f7f\u7528\u7279\u5b9a\u65bc\u5bb9\u5668\u7684\u4e3b\u6a5f\u64cd\u4f5c\u7cfb\u7d71\u800c\u4e0d\u662f\u901a\u7528\u64cd\u4f5c\u7cfb\u7d71\u4f86\u6e1b\u5c11\u653b\u64ca\u9762\u3002<\/li>\n\n\n\n<li>\u50c5\u5728\u55ae\u500b\u4e3b\u6a5f\u64cd\u4f5c\u7cfb\u7d71\u5167\u6838\u4e0a\u5c07\u5177\u6709\u76f8\u540c\u76ee\u7684\u3001\u654f\u611f\u6027\u548c\u5a01\u8105\u614b\u52e2\u7684\u5bb9\u5668\u5206\u7d44\uff0c\u4ee5\u5be6\u73fe\u984d\u5916\u7684\u7e31\u6df1\u9632\u79a6\u3002<\/li>\n\n\n\n<li>\u70ba\u93e1\u50cf\u63a1\u7528\u7279\u5b9a\u65bc\u5bb9\u5668\u7684\u6f0f\u6d1e\u7ba1\u7406\u5de5\u5177\u548c\u6d41\u7a0b\uff0c\u4ee5\u9632\u6b62\u53d7\u5230\u640d\u5bb3\u3002<\/li>\n\n\n\n<li>\u8003\u616e\u4f7f\u7528\u57fa\u65bc\u786c\u4ef6\u7684\u5c0d\u7b56\u70ba\u53ef\u4fe1\u8a08\u7b97\u63d0\u4f9b\u57fa\u790e\u3002<\/li>\n\n\n\n<li>\u4f7f\u7528\u5bb9\u5668\u611f\u77e5\u904b\u884c\u6642\u9632\u79a6\u5de5\u5177\u3002<\/li>\n<\/ol>\n\n\n\n<p><strong>\u53c3\u8003<\/strong><br>.&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/what-is\/container-security.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u4ec0\u9ebc\u662f\u5bb9\u5668\u5b89\u5168\uff1f<\/a><br>.&nbsp;<a href=\"https:\/\/www.nist.gov\/publications\/application-container-security-guide\" target=\"_blank\" rel=\"noreferrer noopener\">NIST SP 800-192\uff08\u61c9\u7528\u5bb9\u5668\u5b89\u5168\u6307\u5357\uff09<\/a><br>.&nbsp;<a href=\"https:\/\/www.tripwire.com\/state-of-security\/devops\/guide-container-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5bb9\u5668\u5b89\u5168\u6307\u5357\u2014\u2014\u4f60\u9700\u8981\u77e5\u9053\u7684\u4e00\u5207<\/a><br>.&nbsp;<a href=\"https:\/\/hub.packtpub.com\/pets-cattle-analogy-demonstrates-how-serverless-fits-software-infrastructure-landscape\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5bf5\u7269\u548c\u725b\u7684\u985e\u6bd4\u5c55\u793a\u4e86\u7121\u670d\u52d9\u5668\u5982\u4f55\u878d\u5165\u8edf\u4ef6\u57fa\u790e\u8a2d\u65bd\u9818\u57df<\/a><br>.&nbsp;<a href=\"http:\/\/cloudscaling.com\/blog\/cloud-computing\/the-history-of-pets-vs-cattle\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5bf5\u7269\u8207\u725b\u7684\u6b77\u53f2\u4ee5\u53ca\u5982\u4f55\u6b63\u78ba\u4f7f\u7528\u985e\u6bd4<\/a><br>.&nbsp;<a href=\"https:\/\/wa.aws.amazon.com\/wellarchitected\/2020-07-02T19-33-23\/wat.concept.elasticity.en.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u5f48\u6027<\/a><br>.&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/cost-optimization-automating-elasticity\/introduction.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u81ea\u52d5\u5316\u5f48\u6027<\/a><\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/wentzwu.com\/2021\/04\/07\/cissp-practice-questions-20210408\/\" target=\"_blank\">Wentz Wu QOTD-20210408<\/a><\/p>\n\n\n\n<p>PS:\u6b64\u6587\u7ae0\u7d93\u904e\u4f5c\u8005\u540c\u610f\u520a\u767b \u4e26\u4e14\u6388\u6b0a\u53ef\u4ee5\u7ffb\u8b6f\u6210\u4e2d\u6587<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>-\u5bb9\u5668\u6280\u8853\u67b6\u69cb\u5bb9\u5668\u6620\u50cf\u662f\u7531\u958b\u767c\u4eba\u54e1\u5275\u5efa\u548c\u8a3b\u518a\u7684\u5305\uff0c\u5176\u4e2d\u5305\u542b\u5728\u5bb9\u5668\u4e2d\u904b\u884c\u6240\u9700\u7684\u6240\u6709\u6587\u4ef6\uff0c\u901a\u5e38\u6309\u5c64\u7d44\u7e54\u3002\u6620\u50cf\u901a\u5e38\u5305 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-503","post","type-post","status-publish","format-standard","hentry","category-cisspcertified-information-systems-security-professional"],"_links":{"self":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=503"}],"version-history":[{"count":2,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/503\/revisions"}],"predecessor-version":[{"id":2862,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/503\/revisions\/2862"}],"wp:attachment":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}