Cado Security launches solution for forensic investigations in distroless container environments

Cado Security has introduced a solution for conducting forensic investigations in distroless container environments. With Cado Security’s new offering, security teams can investigate the root cause, scope, and impact of malicious activity detected within distroless container environments to gain greater visibility into cloud risk.

Cado distroless container investigations

Distroless containers are designed for efficiency and security, stripped of standard OS components like shell utilities and package managers. While these containers offer some security benefits by minimizing the attack surface, they actually leave a huge security blindspot when something malicious does indeed occur. Until today, it was impossible to perform an investigation in these environments, resulting in a significant visibility gap.

“The use of distroless containers is on the rise, promising agile deployment and increased security,” said Chris Doman, CTO at Cado Security. “However, their minimalist design introduces complexities when it comes to investigation and response. This is a pressing security challenge as millions of distroless containers are being used by companies worldwide. We are addressing this with the world’s first and only solution to perform forensics investigations in these environments in order to provide much-needed visibility for security teams.”

Cado Security delivers a solution that addresses the unique challenges distroless containers introduce for security teams. Cado’s patent-pending approach collects data from distroless and private clusters without impacting the target container to enable immediate investigation.

The collected data includes running processes, crucial log files, and forensic artifacts. Cado also uses its previously open-sourced “varc” toolset to collect memory from individual processes for forensic analysis. This evidence is then seamlessly presented in the Cado platform for unprecedented visibility into cloud risk.

More about

Don't miss