31
CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE Ted Brunell Chief Architect, DoD Programs Principal Solutions Architect [email protected] @DoDCloudGuy

CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

CONTAINERS AND SECURITY:A MATCH MADE IN CYBERSPACE

Ted BrunellChief Architect, DoD ProgramsPrincipal Solutions [email protected]@DoDCloudGuy

Page 2: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

"The views expressed in this presentation are those of the author(s) and do not necessarily reflect the official policy or position of the Air Force, the Department of Defense, or the U.S.

Government."

2

Page 3: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

3

CONTAINERS CHANGE HOW WE DEVELOP, DEPLOY AND MANAGE APPLICATIONS

INFRASTRUCTURE APPLICATIONS

● Application processes on a shared kernel

● Simpler, lighter, and denser than VMs

● Portable across different environments

● Package apps with all dependencies

● Deploy to any environment in seconds

● Easily accessed and shared

Page 4: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

4

THEY ALSO CHANGE HOW WE SECURE OUR WORKLOADS

Page 5: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

AUTOMATED & INTEGRATED SECURITY

5

Container Content

Container Registry

CI/CD Pipeline

Deployment Policies

Security Ecosystem

Container Host Multi-tenancyContainer Platform

Network Isolation Storage

Audit & Logging API Management

DEFENDInfrastructure

EXTEND

CONTROLApplication Security

Page 6: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

CONTROLSecure the Pipeline & the Applications

Container Content

Container Registry

CI/CD Pipeline

Deployment Policies

Page 7: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

7

IT STARTS WITH TRUSTED SOURCES

Page 8: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

CONTAINER HEALTH CHECKS

https://access.redhat.com/containers/8

Page 9: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

SECURE CONTAINER LIFECYCLE

9

TRUSTEDIMAGE

REGISTRY

KUBERNETESCLUSTER

DEVELOPER GIT SERVER ARTIFACT REPOSITORY

CI/CD PIPELINE (JENKINS)

IMAGE BUILD & DEPLOY

TRUSTEDIMAGEREGISTRY

KUBERNETESCLUSTER

GOLIVE?PROMOTE

TO TESTPROMOTE

TO UATPROMOTETO PROD

RELEASE MANAGER

NON-PROD PRODDEV TEST UAT

Page 10: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

10

DEPLOYOPERATEMONITORSCALEADAPT

PLAN CREATE BUILD TEST SECURE

AUTOMATING DEVOPS AND

DEPLOYMENT POLICIES

Page 11: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

11

DESIGN FOR SEPARATION OF CONCERNS

CORE IMAGE

IT Operations

CORE IMAGE

MIDDLEWARE

Architects

CORE IMAGE

MIDDLEWARE

APPLICATION

Application

Developers

Page 12: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

DEFENDSecure the Infrastructure

Container Host Multi-tenancyContainer Platform

Network Isolation Storage

Audit & Logging API Management

Page 13: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

RED HAT ENTERPRISE LINUX ATOMIC HOST

Minimized host environment tuned for running Linux containers while maintaining the built-in security features of Red Hat Enterprise Linux.

A stable, reliable host environment with built-in security features that allow you to isolate containers from other containers and from the kernel.

THE OS MATTERS:CONTAINER HOST & MULTI-TENANCY

SELinux kernel namespaces cgroups seccomp

RED HAT ENTERPRISE LINUX

THE FOUNDATION FOR SECURE, SCALABLE CONTAINERS

capabilities

13

Page 14: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

14

● Role-based Access Controls with LDAP and OAuth integration

● Secure communication● Platform multi-tenant security● Integrated & extensible secrets

management● Logging, Monitoring, Metrics● Consistency across multiple

infrastructures

RHEL

NODE

c

RHEL

NODE

RHEL

NODE

RHEL

NODE

RHEL

NODE

RHEL

NODE

C

C

C C

C

C

C CC C

RED HATENTERPRISE LINUX

MASTER

API/AUTHENTICATION

DATA STORE

SCHEDULER

HEALTH/SCALING

SECURING THE CONTAINER PLATFORM

PERSISTENTSTORAGE

REGISTRY

PHYSICAL VIRTUAL PRIVATE PUBLIC HYBRID

Page 15: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

15

NODE

MASTER● Secure mechanism for holding sensitive data e.g.

○ Passwords and credentials

○ SSH Keys

○ Certificates

● Secrets are made available as

○ Environment variables

○ Volume mounts

○ Interaction with external systems

● Encrypted in transit and at rest

● Never rest on the nodes

Container

Distributed Store

Container

SECRETS MANAGEMENT

Page 16: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

16

● Aggregate logs for hosts and applications

● Access control

○ Cluster administrators can view all logs

○ Users can view logs for their projects

● Ability to send logs elsewhere

○ External elasticsearch, Splunk, etc

LOGGING and AUDITING

Page 17: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

17

CONTAINER METRICS

Page 18: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

● Multi-tenant Network Support

○ Project-level network isolation

○ Multicast support

○ Egress network policies

● Network Policy

○ Granular policy-based isolation

18

NETWORK DEFENSE

NODE

POD POD

PODPOD

NODE

POD POD

PODPOD

PROJECT A PROJECT B

DEFAULT NAMESPACE

PROJECT C

Page 19: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

19

NETWORK POLICY: FINE GRAINED ISOLATION

PROJECT A

POD

POD

POD

POD

PROJECT B

POD

POD

POD

POD

Example Policies

● Allow all traffic inside the project

● Allow traffic from green to gray

● Allow traffic to purple on 8080

8080

5432

apiVersion: extensions/v1beta1kind: NetworkPolicymetadata:

name: allow-to-purple-on-8080spec:

podSelector:matchLabels:

color: purpleingress:- ports:

- protocol: tcpport: 8080

Page 20: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

20

Secure storage by using

● SELinux Mandatory Access Controls

● Secure mounts

● Supplemental group IDs for shared storage

ATTACHED STORAGE

RHEL

NODE

c

RHEL

NODE

RHEL

NODE

RHEL

NODE

RHEL

NODE

RHEL

NODE

C

C

C C

C

C

C CC C

RED HATENTERPRISE LINUX

MASTER

API/AUTHENTICATION

DATA STORE

SCHEDULER

HEALTH/SCALING

PERSISTENTSTORAGE

REGISTRY

PHYSICAL VIRTUAL PRIVATE PUBLIC HYBRID

Page 21: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

● Authentication and authorization

● LDAP integration

● End-point access controls

● Rate limiting

API MANAGEMENT

21

Page 22: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

EXTENDLeverage the Ecosystem

Page 23: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

For enhanced security, or to meet existing policies, integrate with enterprise security tools, such as

● Identity and Access Management / Privileged Access Management

● External Certificate Authorities

● External Vaults / Key Management solutions

● External Hardware Security Modules (HSM)

● Filesystem encryption tools

● Container content scanners & vulnerability management tools

● Container runtime analysis tools

● Security Information and Event Monitoring (SIEM)

THE SECURITY ECOSYSTEM

23

Page 24: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

24

Sysdig

NGINX

Cisco ContivAporeto

Sonatype

Black Duck

TremoloTigera

Twistlock

Page 25: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

LOOKING INTO THE NOT SO DISTANT FUTURE

Page 26: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

26

CONTAINER CHALLENGESEnterprise Build, Pipeline and Runtime concerns

● Supply chain needs further security policy services

● Microservices have special networking and governance needs

● Build and runtime tools and services need decoupling

Page 27: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

CI/CD Pipeline

27

Build QA

Grafeas

(Metadata Attestation

Findings)

Kritis

Deploy Time

Policy

“Bob can start a

build but Alice

must certify for

production”

“I only want to

run scanned code

that has been QA

certified”

“Do I have any running

jobs that are affected

by this new

vulnerability” “I want to see a full

compliance summary of

all deployed

components”

Production

ATTESTATION OF SECURITY POLICY

Grafeas (Scribe) and Kritis (Judge)

Test Scan Analysis

Page 28: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

28

ISTIO AND MICROSERVICESConnect, manage, and secure microservices.

● Collaborative offert between Red Hat, Google Cloud and IBM○ Sidecar container with the features and functions for

creating and managing microservices

○ Monitoring○ Tracing○ circuit breakers○ Routing○ load balancing○ fault injection

○ Retries○ Timeouts○ Mirroring○ Access control○ Rate limiting○ ...And more

v1.0 ANNOUNCED 07/31/2018!

Page 29: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

29

● OCI-compliant, daemon-less tool for

building/modifying OCI/Docker images.

● Enables fine-grain control over the commands

and content of each image layer

● Container host utils. can optionally be leveraged

as part of the build

● Can use a Dockerfile

● Shares the underlying image and storage

components with CRI-O

● A lightweight, OCI-compliant container

runtime designed for Kubernetes

● Runs any OCI / Docker container from any

OCI / Docker registry

● Focus on stability and life cycle with the

platform

● Improve container security & performance

at scale

OCI BASED INNOVATION

Page 30: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

Self-Service

Red Hat Enterprise Linux

Container Runtime & Packaging

DEFENDInfrastructure

EXTEND

CONTROLApplication Security

30

EXISTING AUTOMATION

TOOLSETS

SCM(GIT)

CI/CD

SERVICE LAYER

ROUTING LAYER

PERSISTENT

STORAGE

REGISTRY

RHEL

NODE

C

C

RHEL

NODE

C C

RHEL

NODE

c

C

C

RHEL

NODE

C C

RHEL

NODE

C

RHEL

NODE

CRED HATENTERPRISE LINUX

MASTER

API/AUTHENTICATION

DATA STORE

SCHEDULER

HEALTH/SCALING

PHYSICAL VIRTUAL PRIVATE PUBLIC HYBRID

BRINGING IT ALL TOGETHER

Page 31: CONTAINERS AND SECURITY: A MATCH MADE IN CYBERSPACE · containers while maintaining the built-in security features of Red Hat Enterprise Linux. A stable, reliable host environment

THANK YOU

31