DevOps and Container Security



Similar documents
Trusted Docker Containers and Trusted VMs in OpenStack. Raghu Yeluri Abhishek Gupta

Technical Brief Distributed Trusted Computing

How to Secure Infrastructure Clouds with Trusted Computing Technologies

The Virtualization Practice

WHITEPAPER INTRODUCTION TO CONTAINER SECURITY. Introduction to Container Security

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

Intel Service Assurance Administrator. Product Overview

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape

Citrix NetScaler and Citrix XenDesktop 7 Deployment Guide

Jun (Jim) Xu Principal Engineer, Futurewei Technologies, Inc.

Accelerate OpenStack* Together. * OpenStack is a registered trademark of the OpenStack Foundation

SDN/OpenFlow. Outline. Performance U!, Winterschool, Zurich. SDN to OpenFlow. OpenFlow a valid technology!

Container Clusters on OpenStack

The Definitive Guide To Docker Containers

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Index. BIOS rootkit, 119 Broad network access, 107

CLOUD SECURITY: Secure Your Infrastructure

How To Install Project Photon On Vsphere 5.5 & 6.0 (Vmware Vspher) With Docker (Virtual) On Linux (Amd64) On A Ubuntu Vspheon Vspheres 5.4

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Server Virtualization Techniques Includes Slides from NIST (Lee Badger)

Intel Media SDK Library Distribution and Dispatching Process

Intel Trusted Platforms Overview

Sage Document Management. User's Guide Version 12.1

Storage Basics Architecting the Storage Supplemental Handout

RED HAT CONTAINER STRATEGY

Sage Document Management. User's Guide Version 13.1

Software Defined Everything

Building Blocks Towards a Trustworthy NFV Infrastructure

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

One-Stop Intel TXT Activation Guide

Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS)

How to Configure Intel X520 Ethernet Server Adapter Based Virtual Functions on Citrix* XenServer 6.0*

A lap around Team Foundation Server 2015 en Visual Studio 2015

Getting Started Using Project Photon on VMware Fusion/Workstation

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.

Sage Timberline Office

Platform as a Service and Container Clouds

Microsoft Exchange 2013 Citrix NetScaler Deployment Guide

One-Stop Intel TXT Activation Guide

Docker : devops, shared registries, HPC and emerging use cases. François Moreews & Olivier Sallou

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Using the TPM to Solve Today s Most Urgent Cybersecurity Problems

Containers, Docker, and Security: State of the Union

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Trusted Geolocation in The Cloud Technical Demonstration

ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK

Desktop Virtualization. The back-end

Linstantiation of applications. Docker accelerate

Jenkins World Tour 2015 Santa Clara, CA, September 2-3

新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV)

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

A Multivariate Statistical Analysis of Stock Trends. Abstract

Modern Application Architecture for the Enterprise

Private Cloud Management

ShareFile Enterprise: Security Whitepaper

Windows Server Virtualization & The Windows Hypervisor

Rummage Web Server Tuning Evaluation through Benchmark

Building a Kubernetes Cluster with Ansible. Patrick Galbraith, ATG Cloud Computing Expo, NYC, May 2016

How Bigtop Leveraged Docker for Build Automation and One-Click Hadoop Provisioning

Linux A first-class citizen in Windows Azure. Bruno Terkaly bterkaly@microsoft.com Principal Software Engineer Mobile/Cloud/Startup/Enterprise

Integration and Automation with Lenovo XClarity Administrator

with VMware vsphere 5.1 (ESXi)

How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1

Intel Embedded Virtualization Manager

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters

Intel Virtualization Technology (VT) in Converged Application Platforms

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist

Building Trust and Compliance in the Cloud with Intel Trusted Execution Technology

Securing the Intelligent Network

IETF 94 - NMRG 38 meeting Intent Based Network Modeling (IBNEMO) Bert Wijnen

Virtualization and IaaS management

LuaFlow, an open source Openflow Controller

Evaluating Intel Virtualization Technology FlexMigration with Multi-generation Intel Multi-core and Intel Dual-core Xeon Processors.

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Intel Desktop public roadmap

Chapter 14 Virtual Machines

ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK

A Certification Authority for Elliptic Curve X.509v3 Certificates

SkySecure System Overview

2015 Techstravaganza The Microsoft Cloud

A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing

Life With Big Data and the Internet of Things

Software Execution Protection in the Cloud

Control your corner of the cloud.

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs

Transcription:

DevOs and Container Security Mike Bartock IT Secialist NIST Paul Cichonski Cloud Architect Lanco John Morello Chief Technology Officer Twistlock Raghu Yeluri Princial Engineer Intel

Certain commercial entities, equiment, or materials may be identified in this document in order to describe an exerimental rocedure or concet adequately. Such identification is not intended to imly recommendation or endorsement by NIST, nor is it intended to imly that the entities, materials, or equiment are necessarily the best available for the urose.

Agenda Introductions Purose of the Panel Panelist Container Work Intel Twistlock Lancoe Discussion on container security and alications Questions from the Audience

Purose Introduction to containers and their uses Different methods of security for containers Discussion of what industry is doing

Trusted Containers Raghu Yeluri Princial Engineer, Lead Cloud Security Architect Datacenter Grou, Intel Cororation

Legal Information Intel technologies, features and benefits deend on system configuration and may require enabled hardware, software or service activation. Performance varies deending on system configuration. No comuter system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. Intel's comilers may or may not otimize to the same degree for non-intel microrocessors for otimizations that are not unique to Intel microrocessors. These otimizations include SSE2, SSE3, and SSSE3 instruction sets and other otimizations. Intel does not guarantee the availability, functionality, or effectiveness of any otimization on microrocessors not manufactured by Intel. Microrocessor-deendent otimizations in this roduct are intended for use with Intel microrocessors. Certain otimizations not secific to Intel microarchitecture are reserved for Intel microrocessors. Please refer to the alicable roduct User and Reference Guides for more information regarding the secific instruction sets covered by this notice. Notice Revision #20110804 No license (exress or imlied, by estoel or otherwise) to any intellectual roerty rights is granted by this document. Intel disclaims all exress and imlied warranties, including without limitation, the imlied warranties of merchantability, fitness for a articular urose, and non-infringement, as well as any warranty arising from course of erformance, course of dealing, or usage in trade. This document contains information on roducts, services and/or rocesses in develoment. All information rovided here is subject to change without notice. Contact your Intel reresentative to obtain the latest forecast, schedule, secifications and roadmas. The roducts and services described may contain defects or errors known as errata which may cause deviations from ublished secifications. Current characterized errata are available on request. Coies of documents which have an order number and are referenced in this document may be obtained by calling 1-800-548-4725 or by visiting www.intel.com/design/literature.htm. Intel, the Intel logo, Intel vpro, Look Inside., the Look Inside. logo, Intel Xeon Phi, and Xeon are trademarks of Intel Cororation in the U.S. and/or other countries. *Other names and brands may be claimed as the roerty of others. 2015 Intel Cororation.

Containers Lightweight, fast, disosable virtual environments A ortability, maintenance and deloyment. Technically: Set of rocesses running ato shared kernel Isolated from rest of the system (limitations) From a distance looks like a VM (SSH, root access, eth0, mount file systems) A VM A Bins / libs Oerating System A Hardware VM Hyervisor A Bins / libs Oerating System A Bins / libs Oerating System VM A A Hyervisor Oerating System Hardware Bins / libs Oerating System VM A A A Bins / libs Container A Oerating System Hardware A Container Bins / libs Have been around for 10+ years (Solaris * containers, Linux * Containers..) Efficient way to build, shi, run, deliver as Tye 1 Hyervisor Tye 2 Hyervisor Linux Containers VMs Containers Docker * Containers commoditized Linux Containers

What is Docker *? Lightweight, oen source engine for creating, deloying containers Provides work flow for running, building and containerizing as. Searates as from where they run; enables Micro-services; scale by comosition Underlying building blocks: Linux * kernel's namesaces (isolation) + cgrous (resource control) +.. Docker* Hub Comonents of Docker * Docker Engine: Runtime for running, building Docker containers Docker Reositories(Hub): SaaS for sharing/managing images Docker Images (layers) Images hold As. Shareable snashot of software. Container is a running instance of image. Orchestration: OenStack *, Docker Swarm, Kubernetes *, Mesos *, CoreOs Tectonic, Fleet Docker* Layers

Container Security Key Customer Asks 1. Docker * Host Integrity Do you trust the Docker daemon? Do you trust the Docker host has booted with Integrity? 2. Docker Container Integrity verification Who wrote the container image? Do you trust the image? Did the right Image get launched? 3. Runtime Protection of containers & Enhanced Isolation How can Intel hel with runtime Integrity, Isolation? 4. Intelligent orchestration OenStack as singular control lane for Trusted VMs and Containers Intel s Focus: Hardware-based Integrity Assurance for Containers Trusted Docker Containers

Trusted Docker * Containers 3 Focus Areas Launch Integrity of Docker * Host & Docker Engine Integrity of Docker Images & Containers Looking ahead Runtime Integrity of Docker Host, H/w-based enhanced Isolation

Trusted VMs - Summary Launch VMs on Servers with demonstrated Boot Integrity Trusted Boot Chain of Trust to VMs Trusted VMs Control where Trusted VMs are launching and migrating: Boundary Control of VMs Trust Boundary Trust Boundary VM-1 A VM-2 vrtm Host OS/Hyervisor Kernel, Initrd++ Tboot HW w/ Intel TXT/TPM A Trusted Platform Module (TPM) Intel Trusted Execution Technology (Intel TXT) Measurements done at the time of boot (Server boot and VM Launch) Measurements match! System & VMs Trusted Enable same model and use-cases for Trusted Containers

Trusted Docker * Containers - 1 Ensure Docker * Containers are launched on Trusted Docker Hosts Boot-time integrity of the Docker Host Measured Launch of Boot Process and comonents with Intel Trusted Execution Technology (Intel TXT) Docker daemon and associated comonents added to TCB and Measured Chain of Trust: H/W FW BIOS OS Docker Engine Remote attestation using Intel Cloud Integrity Technology (Attestation Authority) Trust Boundary TPM Container C e.g. Nginx * Docker Daemon Host OS Container A e.g. Aache * TBOOT HW with Intel TXT Container B e.g. Aache v2 Shared Bin/Libs Docker Host Platform Integrity Assure and attest the Integrity of Docker host/latform

Trusted Docker * Containers - 2 Ensure that Docker * Images not tamered rior to Launch Two Models: 1. Measure and verify Docker images, Chain of Trust: H/W FW BIOS OS Docker Engine Docker image layers 2. Sign images in Docker Hub. Verify images signature rior to launch with root Cert signature that is Sealed to Intel Trusted Execution Technology (Intel TXT) measurements in the Trusted Platform Module (TPM). Can work with Notary* - Docker Content Trust Model. Boundary Control/Geo-Tagging alies equally to Docker Containers as well for comliance needs Orchestrator determines location/boundary at launch time } Agents TPM Container C e.g. Nginx * Docker Daemon Host OS Container A e.g. Aache * TBOOT HW with Intel TXT Container B e.g. Aache v2 Shared Bin/Libs Docker Host & Container Launch Integrity Assure and attest the Integrity of Docker images/containers

How about Docker * Containers in VMs? Leverage Trusted VMs for asserting trust of the host, and the VMs. Include Docker * Daemon as art of VMs TCB measure and verify Docker Daemon as art of VM launch attestation. Boot-time integrity of Host + VMM Integrity assurance of VM and Docker Daemon Chain of Trust: H/W FW BIOS-OS/VMM- VM Docker Engine VM-1 Container as Docker Deamon A VM-2 vrtm Host OS/Hyervisor Kernel, Initrd++ Tboot HW w/ Intel TXT/TPM A Measurements done at the time of boot (Server boot and VM Launch) Measurements match! System & VMs Trusted Trusted Platform Module (TPM) Intel Trusted Execution Technology (Intel TXT) Assure and attest the Integrity of Host and the VM w/ Docker Engine

What is Measured for Trusted Containers Chain of Trust extended to alication launch Trusted launch of containerized alication Docker * Daemon Container management engine (e.g., Docker engine) Measurement Agents Initrd++ (includes tboot-xm) Bootloader, Tboot and OS Kernel Bios Aache * Patch v2 Aache Patch v1 Aache Ubuntu * 14.04 Ubuntu Containerized alication layers (e.g., Docker image layers) ACM signed by manufacturer Intel TXT + TPM Measurement Load-time creation of a comonent s Identity (i.e., Hash of comonent) Intel Trusted Execution Technology (Intel TXT) chain of trust extended u the stack

Looking Ahead: Hardware-based Runtime Integrity Intel Kernel Guard Technology (Intel KGT) Policy secification and enforcement framework Ensuring runtime integrity of kernel and latform assets Extends launch-time integrity to run-time integrity Based on a thin Intel VT-x (VMX-root) layer software comonent called xmon De-rivileges OS Monitors/controls access to critical assets (CRs, MSRs, Memory Pages..) Allows secification of olicy from user-mode via configfs Policy describes assets to be monitored and actions to be taken when monitoring events occur Policy can be locked down until next reboot Intel KGT: Flexible, low overhead integrity framework; oen source Intel Virtualization Technology for IA-32, Intel 64 and Intel Architecture (Intel VT-x)

Placeholder Footer Coy / BU Logo or Name Goes Here

We re going to build a software layer to make the internet rogrammable - Docker, DockerCon 2015

Docker is the best known examle but these trends are being driven by the growth of software across all industries and the need to raidly build, iterate, and imrove it all major IT layers are investing

What are the challenges? Containers don t kee themselves u to date Many more containers but fewer tools for rotecting them Many more, and more diverse, laces where your containers run All or nothing administrative model VM A A Bins/Libs IDS / IPS agent softwa re udat e agent Guest OS Vuln mgmt agent Antimalwa re agent Hyervisor Server / IaaS A B Bins/Libs IDS / IPS agent Guest OS softwa re udat e agent Vuln mgmt agent Antimalwa re agent A A A A A B A B A B A B A B Docker Engine Host OS / VM Server / IaaS 2015 Twistlock 21

Why not existing solutions? IDS / IPS agent IDS / IPS agent IDS / IPS agent Containers are ortable and minimal Vuln mgmt agent Vuln mgmt agent Vuln mgmt agent Deloyment is frictionless A A software software software udate agent udate agent udate agent Anti-malware agent A A Anti-malware agent A A Anti-malware agent Cramming containers full of agents and tools is antithetical to the model

What is Twistlock? The first security solution built for containerized comuting that secures the entire lifecycle of containerized as across all the environments they run in A comany that contributes back to the oen source community 2015 Twistlock 23

Defend your containers Vulnerability management, with an intelligence stream of the latest CVEs and roactive defense Advanced authorization caabilities, including Kerberos suort and role based access control Runtime defense, monitoring container memory sace, storage, and networking to detect and block anomalous behaviors 2015 Twistlock 24

Purose built Agentless Runs anywhere your containers run API driven for continuous integration

Container Security Console Configure Monitor Visualize risk 2015 Twistlock 26

Vulnerability management demo Block deloyment of vulnerable images Tag resources and aly granular olicies 2015 Twistlock 27

Security hardening demo Ensure regulatory comliance Prevent configuration drift 2015 Twistlock 28

RBAC demo 2015 Twistlock 29

Evolution of roles with containers Traditional Just the a A Host / IaaS Reactive analysis and monitoring With Twistlock Micro service A Micro service B Micro service C Micro service D Cluster Managemen t Micro service A Micro service B Host / IaaS Micro service C Micro service D Policy centrally exressed, distributed throughout the dev cycle, and eventing centralized 2015 Twistlock Container Defense Policies Twistlock Container Security Console 30

The containers are coming if they re not already on your network Balance security and caability with tools urose built for the new model

Container Security Paul Cichonski Cloud Architect @aulcichonski

Why Containers? Two Areas of Focus 1. Software Delivery: Build ielines now roduce consistent, immutable artifacts Immutable artifacts offer many benefits for security 2. Software Deloyment: Software deloyment mechanism is common across all technologies (e.g., ython, JVM, c, erl) If it can go into a container, you can deloy it Incredible for devs, but creates many challenges for security

Evolution of Software Delivery Era* Custom Bash Scrits (1990s late 2000s) Characteristics Mutable infrastructure (e.g., send EAR to server) Servers are ets, we even gave them names Many differences between environments Deloyed a few times er month (if lucky) Configuration Management (Late 2000s current) Immutable infrastructure Servers start becoming cattle Still many differences between environments Deloyments haen more, but still slow Containers Immutable infrastructure (now) Servers become more like cattle, OS rovides bare minimum to run container Software systems now fully reroducible in all environments Build/Deloyment ieline is the center of the universe Deloy as frequently as your build ieline can roduce new image *time eriods are rough estimates, they change deending on who you ask.

Deloyment Pielines with Containers Stes taken inside CI (fail fast between stes): 1. Standu deendent services (using containers) for testing 2. Run unit and integration tests on code 3. Create final Docker Image of tested code 4. Start container using newly created image 5. Run black box functional tests on container 6. Run security scans on container 1. Examles: SCAP scan, GAUNTLT tests, CIS Docker Benchmark 7. Push validated image to registry IFF all revious stes ass

Why this is good for security? A successful run of deloyment ieline gives us an immutable image for deloying to roduction Never run anything not validated by ieline Before ever getting to rod, we have already instantiated the container and run: Blackbox functional tests Full security scans (both blackbox and whitebox) This means we can catch security issues before ever releasing software into the wild Side bonus: devs can run all this from their lato

Deloying Containers (high level) Manifest encodes: Docker image to launch on cluster Number of instances to deloy (e.g., run 3 instances of nginx container) Resource requirements (e.g., each container needs 2 cores and 8gb memory) Custom rules (e.g., don t run container X and container Y on same host)

Deloying Containers (high level) Each server (or resource) is only there to run containers Stried down kernel (lower attack surface) Orchestration tooling required to hel schedule containers across a cluster

Benefits for Dev/Os Containers rovide a common oint of abstraction for deloying any arbitrary software stack Great for microservices and olyglot infrastructures We can start thinking about creating infrastructure-level atterns and sharing them via GitHub (think: ackage manager for your datacenter)

What about security? Here be dragons Orchestration layer adds new set of distributed communication rotocols that must be secured Host-level isolation for different workloads still required until container isolation is on ar with OS isolation Storing secrets becomes more comlex in a dynamic world Image validation tooling required to forbid untrusted images (it is not enabled by default) Burden of atching software shifts to devs

Questions?