running security service in gcloud

18
Copyright @ 2016 Aqua Security Software Ltd. All Rights Reserved. Running a Security Service in gcloud Michael Cherny Head of Research

Upload: michael-cherny

Post on 15-Apr-2017

1.229 views

Category:

Software


0 download

TRANSCRIPT

Page 1: Running security service in gcloud

Copyright @ 2016 Aqua Security Software Ltd. All Rights Reserved.

Running a Security Service in gcloudMichael ChernyHead of Research

Page 2: Running security service in gcloud

2

WHO AM I Head of Security Research at Aqua Security, a leader

in container security 20 years of building security products, development

and research Held senior security research positions at Microsoft,

Aoratoand Imperva. 

Presented at security conferences, among them, BlackHat Europe, RSA Europe and Virus Bulleting.

Page 3: Running security service in gcloud

3

PEEKR Scans for known vulnerabilities (CVEs) Profiles container activities on host and network

Automatically runs the image and checks it against malicious behaviors

Highlights suspicious container behavior Free (no credit card needed for registration) https://peekr.aquasec.com

Page 4: Running security service in gcloud

4

PEEKR

Page 5: Running security service in gcloud

5

YOU WERE SAYING... Automatically runs the image and checks it against

malicious behaviors Meaning we are running arbitrary, unknown containers

on our infrastructure Every time we consulted people and organizations, we

got same response...

Page 6: Running security service in gcloud

6

YOU ARE CRAZY

INSANE, NUTS, KOOKY, WACKY...

Page 7: Running security service in gcloud

7

ARCHITECTURAL REQUIREMENTS Scalable web front end Scalable Scanner workers Asynchronous processing Security

Page 8: Running security service in gcloud

8

SECURITY CONCERNS Web front end Malicious containers

Exploding containers Lateral movement  Attacking from our infrastructure

Page 9: Running security service in gcloud

9

MALICIOUS CONTAINERS Local behavior

Fork Bomb Fallocate Resource consumption

Network East-West North-East

Page 10: Running security service in gcloud

10

IMPLEMENTATION Kubernetes Security

Kubernetes Aqua

Page 11: Running security service in gcloud

11

PEEKR ARCHITECTURE OVERVIEWFront end cluster

Front end Service

Web

Queue

CVEs

Back end cluster

Scanner

Page 12: Running security service in gcloud

12

OVERALL SECURITY Log everything Use Kubectl to access containers, to limit ssh access Apply resource quota and limits with Kubernetes

namespaces Network segregation through Kubernetes clusters

Page 13: Running security service in gcloud

13

PROTECTING AGAINST MALICIOUS CONTAINERS Local

Run unprivileged Run with user namespace Containers data (volumes) on separate partition Aqua

Network Deny network access No internet access to backend cluster Communication between clusters is limited to absolute minimum

Page 14: Running security service in gcloud

14

FORK BOMB :(){ :|:& };: Exhausts PIDs System freezes

Page 15: Running security service in gcloud

15

FORK BOMB PROTECTION nproc

ulimit –u 100 Limit per user per session Can be done either for docker daemon or per container Doesn’t enforce for root

PID cgroup Future, kernel 4.3

Page 16: Running security service in gcloud

FORK BOMB DEMO

Page 17: Running security service in gcloud

17

SO WITH A LITTLE HELP

Page 18: Running security service in gcloud

THANK YOUMichael [email protected]@chernymi