Survey says: Container security issues continue to befuddle software developers 

Date:

Share post:

Container security incidents are becoming more common, with nearly one in four respondents to a new survey from BellSoft saying they have experienced a security incident. The survey concluded that questions about security practices remain unresolved.

According to the survey by OpenJDK provider BellSoft, 62% of participating developers reported that human errors were the biggest contributors to container security mistakes.

Among the key findings in the report, BellSoft wrote, are:

  • Developers ranked shells (54%) and package managers (39%) as the most essential tools inside the base container. Package managers present a particularly critical security concern, as they expand the attack surface both directly and by enabling runtime installation of additional unnecessary components. Combined with other non-essential tools, this creates substantial vulnerability exposure in production environments.  A more practical approach is using hardened minimal runtime images, paired with fuller “debug builds” during development, allowing both security and diagnostics without compromise.

  • 55% reported using general-purpose Linux distributions (Ubuntu/Debian or Red Hat-based systems) with hundreds of packages their applications never use. Each represents potential vulnerabilities requiring security patches. When a vulnerability emerges, security teams must evaluate impact and coordinate across thousands of instances, regardless of whether the application uses the affected package.

  • Trusted registries (45%) and vulnerability scanning (43%) were the most commonly employed security mechanisms. These represent basic approaches to container security, whereby organizations are constantly responding to newly discovered vulnerabilities rather than building foundations to minimize exposure.

  • While 31% said they update container images with every release and 26% do so when critical vulnerabilities emerge, 33% update monthly, rarely or only a few times yearly, creating a substantial risk to applications and organizations.

Despite this, 48% of responding developers noted that a good solution could be the use of pre-hardened, security-focused base images, according to the. report, as these vendor-maintained images can reduce exposure to vulnerabilities, strain on operations, cloud costs and the risk of human errors.

“Across every section of the survey, one message repeats consistently: Teams want security, efficiency and simplicity but their current strategies and tooling makes this difficult to achieve,” said Alex Belokrylov, CEO at BellSoft, in a statement in the report. “By adopting hardened images, much of the ongoing security and maintenance responsibility shifts to the image vendor, reducing operational burden and total cost of ownership, while enabling more stable, low-maintenance, and highly secure container environments”

 

Source link

spot_img

Related articles

eScan supply chain attack: what you should know

UPD 30.01.2026: Added technical details about the attack chain and more IoCs. On January 20, a supply chain attack...

ASCOMP PC Internals Overview & Giveaway

ASCOMP PC InternalsWinners Announced!This contest has now expired. Winners will be notified by email.Congratulations to the Winners and...

Arcee's U.S.-made, open source Trinity Large and 10T-checkpoint offer rare look at raw model intelligence

San Francisco-based AI lab Arcee made waves last year for being one of the only U.S. companies to...