Member-only story
Top 6 Threat Detection Tools for Containers
Essentials to Securing Threats for Containerized Cloud-Native Applications

Nowadays, a containerized solution is a de facto standard in the cloud-native application development world. Tools like Docker, Containers, CRI-O, and Kubernetes are on-trend. Millions of development and architecture teams choose a container-based solution to build their product. All well-known cloud providers have numerous services and are based on Kubernetes, Docker, and other container orchestration platforms.
Tools and platforms are a fundamental part of the threat detection foundation. There are a lot of open-source tools that contain a lot of threat detection options. Below I’ve listed some tools that provide logic:
- Static image vulnerability scanning
- Configuration validation
- Secrets scanning
Threat Detection for Containers Refcard contains the extended guide on securing threats for containerized cloud-native applications.
Clair
Clair is a static security scanner tool. It is based on Open Container Initiative (OCI) format. Clair validates and indexes the images against all well-known threats and vulnerability information sources, like CVE Tracker, Redhat security Data, and Debian Security Bug Tracker. Also, Clair provides an API for development integration purposes. It allows you to create your divers to extend and customize Clair functionality. Clair has several Indexer, matcher, notifier, or combo models. The easiest and fastest way to start is the combo model. In this way, it runs in a single process.
For combo mode, you need a load balancer or Kubernetes ingress and a single database, as shown in the figure above.
Trivy
Trivy is a security container scanner based on the CVE threat database. It can also scan misconfiguration, secrets, and software dependencies. Trivy uses several scanning sources, like:
- Container image
- Filesystem and Storage
- Kubernetes cluster
Trivy can be installed on your PC or in the Kubernetes nodes, using npm, apt-get, brew, and other…