Security in a Container based World

Slides:



Advertisements
Similar presentations
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Advertisements

© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Feature: Purchase Requisitions - Requester © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Co- location Mass Market Managed Hosting ISV Hosting.
Windows 7 Training Microsoft Confidential. Windows ® 7 Compatibility Version Checking.
Feature: Purchase Order Prepayments II © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Feature: OLE Notes Migration Utility
Feature: Web Client Keyboard Shortcuts © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Session 1.
Built by Developers for Developers…. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
 Rico Mariani Architect Microsoft Corporation.
WinHEC /22/2017 © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Connect with life Connect with life
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Customer Combiner and Modifier © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
demo Instance AInstance B Read “7” Write “8”

customer.
Securing Microservice Architectures Laura Bell M239.
demo © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
demo Demo.
demo QueryForeign KeyInstance /sm:body()/x:Order/x:Delivery/y:TrackingId1Z
projekt202 © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
The CLR CoreCLRCoreCLR © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
Sr. Dir. – Systems Architecture Inlet Technologies.

MIX 09 4/17/2018 4:41 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Microsoft Ignite /4/2018 8:46 AM
Возможности Excel 2010, о которых следует знать
Citrix Virtual Desktops version 7
Microsoft Ignite /17/ :47 PM
Title of Presentation 11/22/2018 3:34 PM
Protecting Against Credential Theft: Today and Tomorrow
Baseline: How Are We Doing Now?
Microsoft Ignite /28/2018 8:58 AM
Office 365 and Azure Active Directory Premium
Title of Presentation 12/2/2018 3:48 PM
M318.
1/3/2019 1:21 PM © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Deploying a Minecraft Server on Windows Azure
Silverlight Debugging
8/04/2019 9:13 PM © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
4/27/17, Bell #8 What amount of net pay has been earned this period?
DevOps Deep Dive / DevOps in action
SharePoint 2013 Authentication with Azure – Part 1
Windows 8 Security Internals
Taking Windows Security to the Next Level with Group Policy
Виктор Хаджийски Катедра “Металургия на желязото и металолеене”
Young Nuns Origins of Nuns 4/21/2019 2:40 PM
PENSACOLA ENERGY WORK PLAN OCTOBER 10, 2016
Title of Presentation 5/12/ :53 PM
Шитманов Дархан Қаражанұлы Тарих пәнінің
WCF and .NET Framework Microservices in Containers
Title of Presentation 5/24/2019 1:26 PM
5/24/2019 6:44 PM 1/8/18 Bell #10 In a world governed by the gods, is there any room for human will? Do human choices make a difference? EXPLAIN © 2007.
日本初公開!? Vista の新機能を実演 とっちゃん わんくま同盟 7/23/2019 9:09 AM
Title of Presentation 7/24/2019 8:53 PM
TechEd /5/2019 2:08 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
What’s New in Visual Studio 2012 for Web Developers
WCL425 App Compat for Nerds Chris Jackson.
5/6/19, Bell #6 12/11/2019 8:26 PM Explain the relationship between this picture and the events that took place in Chapter 7 in Animal Farm. © 2007 Microsoft.
Presentation transcript:

Security in a Container based World Laura Bell M255

Modern Architecture Security Series

caution: fast paced field ahead watch for out of date content

containers are here

In this talk Container Fundamentals Prevention Detection Some important points that are worth refreshing Prevention Avoid common vulnerabilities and avoid mistakes Detection Prepare for survival and response

Container fundamentals

Language is hard Implication != Meaning

Virtual Machines vs. Containers hypervisor base processor

Containers do not contain

Until now, container implementations vary

open container initiative https://www.opencontainers.org/

Prevention

Check your privileges

The namespace issue there's no user ID isolation

“A process process running as root (UID 0) in a container has root-level privileges on the underlying host when interacting with the kernel”

Reduce your privileges as soon as possible

Don't run as root this may be easier said than done

Use trusted sources

Only run applications from a trusted source

Free, paid, trusted and private prebuilt containers and apps

Signing helps with trust Signing an image, container or containerised app can help determine its origin.

check decide run

Vulnerability Management and Updates

Patching the stack

Operating system Installed applications Installed services Containerisation software

patch every container instance and associated image

Isolate your containers

Protect base operating systems by using virtual machines container hypervisor processor Protect base operating systems by using virtual machines

Use an entreprise grade host (and manage it as such)

Reduce your attack surface Minimise on host services to essentials only (ie. ssh + monitoring)

Defense at every layer

Your application is still the most likely attack vector

Detection

Monitoring your environment

Watch your logs like actually, for real, not just when you’re debugging

Container Orchestration Application Components Border Controls Base operating system Virtualization layer Container Orchestration Application Components Border Controls Monitor every layer

privileged process compromise container compromise privileged process compromise host compromise impact of compromise

Seek assurance

Frequently changing architectures require frequent assessment by someone who understands the tech

container/host configuration review container fuzzing design review API and endpoint testing web application penetration testing

Summary

TL;DR Container Fundamentals Prevention Detection Some important points that are worth refreshing Prevention Avoid common vulnerabilities and avoid mistakes Detection Prepare for survival and response

Prevention Check your privilege Isolate your containers Principle of least privilege at all stages Use trusted sources Not all container images are equal Vulnerability management and updates Prepare for survival and response Isolate your containers Principle of least privilege at all stages Layer your defenses

Detection Monitoring and Logging Seek Assurance Log and monitor all layers of your deployment architecture Seek Assurance Get appropriate penetration testing of both application and infrastructure components

Links and Resources Container Security Cheat sheet http://container-solutions.com/content/uploads/2015/06/15.06.15_DockerCheatSheet_A2.pdf Docker Security Benchmark Tool https://github.com/docker/docker-bench-security

Related Ignite NZ Sessions 1 5 Securing Microservice Architectures Thursday 10:40am 6 2 3 Find me later at… Hub Happy Hour Wed 5:30-6:30pm Hub Happy Hour Thu 5:30-6:30pm Closing drinks Fri 3:00-4:30pm 4

Resources Microsoft Virtual Academy TechNet & MSDN Flash 11/22/2018 Microsoft Virtual Academy Resources TechNet & MSDN Flash Free Online Learning http://aka.ms/mva Subscribe to our fortnightly newsletter http://aka.ms/technetnz http://aka.ms/msdnnz Sessions on Demand http://aka.ms/ch9nz © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Complete your session evaluation now and be in to win! 11/22/2018 1:59 PM Complete your session evaluation now and be in to win! © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

11/22/2018 1:59 PM © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.