dockercon sf 2015: docker security

22
Least-privilege Microservices Diogo Mónica Nathan McCauley

Upload: docker-inc

Post on 31-Jul-2015

3.321 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: DockerCon SF 2015: Docker Security

Least-privilege Microservices

Diogo Mónica Nathan McCauley

Page 2: DockerCon SF 2015: Docker Security

Agenda

• Why least-privilege

• History of least-privilege

• Least-privilege with Docker

• Ongoing and future work

• Conclusions

Page 3: DockerCon SF 2015: Docker Security

“Every process must be able to access only the information and resources that are necessary for its legitimate purpose”

Page 4: DockerCon SF 2015: Docker Security

Front-endServer

Database

Auth Service

Page 5: DockerCon SF 2015: Docker Security

1990

Internet

All-in-one

Page 6: DockerCon SF 2015: Docker Security

2000

Internet

DatabasesServicesFront-end

Page 7: DockerCon SF 2015: Docker Security

2010

Internet

Page 8: DockerCon SF 2015: Docker Security
Page 9: DockerCon SF 2015: Docker Security

Server

Host OS

Docker Engine

App A

App B

App C

App D

App E

App F

libraries

Container

One Process

Page 10: DockerCon SF 2015: Docker Security

Today

Internet

Page 11: DockerCon SF 2015: Docker Security

‣A FE server has a very different security profile than a database or a worker host

‣ Imagine that each container only has access exactly to the resources and APIs it needs. No more, no less.

Front-end Server Back-end Server

‣Access to a lot of downstream services ‣Most exposed

‣ I/O intensive ‣Limited network access

Worker Host

‣CPU Intensive ‣Wide range of workloads

Profiles

Page 12: DockerCon SF 2015: Docker Security

‣A container is a process. Let’s find out what syscalls it needs.

Process Monitoring

Page 13: DockerCon SF 2015: Docker Security

‣Namespaces provide an isolated view of the system (Network, PID, etc)

‣Cgroups limit and isolate the resource usage of a collection of processes

‣Linux Security Modules give us a MAC (AppArmor, SELinux)

Fine-grained controls

Page 14: DockerCon SF 2015: Docker Security

Fine-grained controls‣Capabilities divides the privileges of root into distinct units (bind, chown, etc)

‣Per-container ulimit (since 1.6)

‣User-namespaces: root inside is not root outside (remapped root for 1.8)

‣Seccomp: Individual syscall filtering (working on my laptop)

Page 15: DockerCon SF 2015: Docker Security

Safer by default

‣Less than half the Linux capabilities by default

‣Copy-on-write ensures immutability

‣No device access by default

‣Default AppArmor and SELinux profiles for an increasing number of containers

Page 16: DockerCon SF 2015: Docker Security

Safer by default

‣Smaller footprint

‣Remove all unneeded packages

‣Remove all unneeded users

‣Remove all suid binaries

Debian

Page 17: DockerCon SF 2015: Docker Security

Security Profiles

Debian

‣Producers of containers should be responsible for creating adequate profiles

‣Profile gets shipped with the container

‣Aggregates all of the different isolation mechanisms into one single profile

Page 18: DockerCon SF 2015: Docker Security

Securing the Ecosystem

Debian

User-namespaces Seccomp Provenance

Selinux Kerberos

Page 19: DockerCon SF 2015: Docker Security

Intro to Container Security

Debian

http://bit.ly/1M4O9XE

Page 20: DockerCon SF 2015: Docker Security

Docker Bench

Debian

https://dockerbench.com/

‣Fully automated

‣Shipped as a container that tests containers

Page 21: DockerCon SF 2015: Docker Security

Conclusion

‣Docker is on the path to support least-privilege microservices, since it allows fine-grained control over what access each container should have.

‣We will need easier tooling to define per-container security profiles

‣You can help!

#docker-security on Freenode