Docker container security

During the execution of this assessment, we check (once or periodic) the components of your Docker container(s) for known vulnerabilities.

After all, an attacker who manages to gain access to your Docker container could also easily gain access to your other containers. By continuously scanning your Docker containers for vulnerabilities, you take targeted action to monitor and actively secure them.

Working method

Our investigations into Docker containers go through these phases:

Conversation
We start with a discussion about the collaboration and test approach.

Examination
We can investigate your Docker container (s) once or periodically for vulnerabilities. During a periodic examination, we keep a log of the results.

Notification
In the case of a periodic investigation, we will contact you as soon as new vulnerabilities are discovered.

Documentation
We document our findings and personalized advice in a comprehensive test report.

Handover
You will receive a report from us on the performed scans, with the findings and advice.

Ethical hackers die samen naar een kwetsbaarheid kijken

Investment

G‍een organisatie is hetzelfde en dat geldt ook voor de informatie die erover gevonden kan worden. Een beveiligingsonderzoek naar uw publieke 'exposure' is dus altijd maatwerk.

Natuurlijk kunt u de scope van het onderzoek beperken om kosten te limiteren. Wij informeren u hier graag over.

Aan de slag

Wilt u permanente zekerheid over de veilige inrichting van uw servers of sites? Neem dan nu contact met ons op voor een vrijblijvend kennismakingsgesprek.

Contact Us