Skip to content
@openzerotrust

OpenZeroTrust

contributions welcome License OpenZeroTrust Logowq

Open Zero Trust

Overview

Open Zero Trust is a Full Lifecycle Container Security platform, delivering cloud-native security with uncompromising end-to-end protection, from DevOps vulnerability protection to automated run-time security, featuring a true Layer 7 ( application ) container firewall that can block zero days and other threats comming from undiscovered vulnerabilities and unexpected application behaviours.

With the Open Zero Trust (OZT) platform, DevOps, DevSecOps, and Security teams have the tools they need to secure the entire container pipeline, from Build to Ship to Run, automatically.

Please note that temporarily code and documentation links point to NeuVector repository.

Table of Contents

History

The Open Zero Trust project started as NeuVector in 2015 by industry veterans Fei Huang and Gary Duan. Fei’s background is in security and virtualization from VMWare and Trend Micro, while Gary’s background is in security at Fortinet and Cisco.

NeuVector, previously a closed source product, has been in production at over a hundred enterprises, securing docker, Kubernetes, OpenShift, Rancher, Mirantis and public cloud (EKS, AKS, IKS, GKE etc) deployments. A large cloud service provider has stress tested the NeuVector architecture in a 1,000 node cluster successfully.

Initially focused on run-time security of production workloads, the product has expanded to provide security across the lifecycle of containers, from build-phase scanning to admission controls and production security. The cloud-native zero trust security platform has had several major releases and is currently in its fifth generation, and there are several patents granted in the areas of network security and automated learning in a container environment.

In October, 2021, SUSE acquired NeuVector and announced plans to open source the software.

Code History

Since it was started as a closed source product, licensed only to enterprise customers for fee, the code history of the project is not publicly available due to issues such as privacy concerns with customers and PII information which existed in various parts of the code, as well as the use of internal proprietary tools for updating and building new versions. Typically, the project had major releases once per year, minor releases every 4-5 months, and bug fix/patch releases every 4-6 weeks.

Why make it opensource

We want to give back to the community and being a security product in itself it makes even more sense to open it up to the participation and eyes from the community members in order to help make it an even more secure and a better product for the whole benefit of the whole ecosystem.

Architecture

Neuvector_architecture

There are four main components:

  • Manager - Security Center Admin Console for OZT Container Security Platform, runs in odd numbers, usually 3.
  • Scanner - Vulnerability scanner for OZT Container Security Platform.
  • Enforcer - The Enforcer is a lightweight container that enforces the security policies on all the kubernetes cluster nodes.
  • Controller - The Controller manages the OZT Enforcer container cluster and provides REST APIs for the management console.

Features

Vulnerability Scanning:

  • Container Platforms
  • Kubernetes cluster nodes
  • Registries
  • Running containers

Zero-Trust security:

  • Policies based on application behavior, zero-noise.
  • Blocking unexpected behaviours at network level (including layer 7 protocols), filesystem and process
  • Zero-Trust Network Access (ZTNA)

Automation:

  • Make your security part of your application CI/CD pipelines using CRDs.
  • Integrate with other applications and tools using the API.
  • Automated policy generation based on application behaviour learned using ML

Admission control

  • Allow you to define extra criteria to control what gets admited into your Kubernetes cluster

Network Layer 7 Application protocol

  • Can detect and verify more than 30 protocols

Unique Deep Packet Inspection technology

  • Monitor and protect 'East-west' and 'North-south' container traffic.
  • Identify and stop attacks, data leaks or verify the application access to further reduce the attack surface
  • Web Application Firewall
  • Data Loss Prevention

Compliance checks

  • PCI, GDPR, HIPAA and NIST
  • Images, Cluster nodes and Containers

Visualize and act upon live network activity

Send notification and alerts of Security events

Generate Risk reports

Advice on how to reduce Risks

Roadmap

Getting Started

In our docs you can find many examples and information about OZT. Documentation for the Open Zero Trust project can be found temporarily here, you can find many examples and information about OZT. This will soon be replicating into this repo.

You can also visit our official blog where you can find interesting articles, news and anouncements.

If you have some comments and would like to reach out or get involved in the project you can also visit our chat group #ozt.

Quick start

OZT can be deployed in many kubernetes distributions and through different container management platforms, here you can find instructions on how to deploy on some of them:

For more information visit the deployment section in our documentation page.

Here you can see how to install OZT from Rancher:

Neuvector_install_from_rancher

Contributing

Contribute and join us!

Do you have ideas you would like to see implemented into the project? do you see something that needs improvement? have you already developed something and want to see it in the main branch?

We welcome contributors!

It doesn't have to be just technical.

Visit our Contributing Guidelines.

Join our slack channel #ozt at slack.rancher.io

Security

We are all about security, if you found a security issue we welcome your feedback.

Please have a look at our security guidelines for how to report a vulnerability.

License

Copyright © 2016-2022 NeuVector Inc. All Rights Reserved

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

Migration

The actively managed project is at https://github.com/neuvector/neuvector. It will be migrated to this repository.

Popular repositories

  1. openzerotrust.io openzerotrust.io Public

    TypeScript 1 1

  2. literature literature Public

    1

  3. docs docs Public

    Documentation

    1

  4. .github .github Public

    Information about the Open Zero Trust project

    1

Repositories

Showing 4 of 4 repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…