Hacker News new | past | comments | ask | show | jobs | submit login
Show HN: We have just released our first Debloating tool for Containers (github.com/negativa-ai)
5 points by ahmedaley 2 days ago | hide | past | favorite | 4 comments
We have been working on tools for safe debloating of software for a few years now at the university. BLAFS is one of our first tools to release for file debloating, a bloat-aware filesystem for container debloating. It detects the files used by the container, and the debloats the container removing the unused files. The debloated containers are fully functional and can run the same workload as the original containers, but with a much smaller size and faster deployment.

Check the paper for more details: https://arxiv.org/abs/2305.04641






I have some thoughts here, if the team needs their tool to be well recognized, they must adopt any of the industry best practices for security benchmarks. As I believe that the software should address security concerns, as it addresses performance concerns, or its intended business need. Security is the hot potato, by which companies are leveraging and developing their spaces in the market. It is one of the key principles by which big companies are deciding to go forward or reject new software.

Beginning with the Container Security, I suggest NIST Special Publication 800-190 for Container Security to be adopted; "https://csrc.nist.gov/pubs/sp/800/190/final" While NIST publications/standards are extremely recognized and followed in the US, they are considered an industry best practice worldwide.

Thanks, Waleed Waheed. SR Mgr GRC, RSA Security.


Third thought, adopting the principles of the CISA (Cybersecurity and Infrastructure Security Agency) Secure By Design Pledge, even if the new startup is not intended to sign the pledge with CISA it is very beneficial to take the pledge's principles into consideration. Big and Giant Software manufacturers are signing this pledge with CISA. https://www.cisa.gov/securebydesign/pledge

Thanks, Waleed Waheed. Sr Mgr GRC, RSA Security.


Fourth and final thought - for now-, from a cost-benefit analysis standpoint, it is not beneficial to hire full time Application Security personnel. BUT, it is extremely beneficial to have someone overlooking the tool/SW from an application security perspective, either on an ad-hoc or part-time basis. That's very important to have a secure software, trusted by the purchasing entities.

Thanks, Waleed Waheed. Sr Mgr GRC, RSA Security.


Second thought, I would like to recommend adopting a Secure Development Lifecycle approach. Going for NIST related framework also (SP 800-218), I recommend adopting the principles of this framework: https://csrc.nist.gov/pubs/sp/800/218/final

Thanks, Waleed Waheed Sr Mgr GRC, RSA Security.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: