SlideShare a Scribd company logo
1 of 18
Copyright @ 2016 Aqua Security Software Ltd. All Rights Reserved.
Running a Security
Service in gcloud
Michael Cherny
Head of Research
2
WHO AM I
 Head of Security Research at Aqua Security, a leader
in container security
 20 years of building security products, development
and research
 Held senior security research positions at Microsoft,
Aorato
and Imperva.
 Presented at security conferences, among them,
BlackHat Europe, RSA Europe and Virus Bulleting.
3
PEEKR
 Scans for known vulnerabilities (CVEs)
 Profiles container activities on host and network
 Automatically runs the image and checks it against malicious
behaviors
 Highlights suspicious container behavior
 Free (no credit card needed for registration)
 https://peekr.aquasec.com
4
PEEKR
5
YOU WERE SAYING...
 Automatically runs the image and checks it against
malicious behaviors
 Meaning we are running arbitrary, unknown containers
on our infrastructure
 Every time we consulted people and organizations, we
got same response...
6
YOU ARE CRAZY
INSANE, NUTS, KOOKY,
WACKY...
7
ARCHITECTURAL REQUIREMENTS
 Scalable web front end
 Scalable Scanner workers
 Asynchronous processing
 Security
8
SECURITY CONCERNS
 Web front end
 Malicious containers
 Exploding containers
 Lateral movement
 Attacking from our infrastructure
9
MALICIOUS CONTAINERS
 Local behavior
 Fork Bomb
 Fallocate
 Resource consumption
 Network
 East-West
 North-East
10
IMPLEMENTATION
 Kubernetes
 Security
 Kubernetes
 Aqua
11
PEEKR ARCHITECTURE OVERVIEW
Front end cluster
Front
end
Service
Web
Queue
CVEs
Back end cluster
Scanner
12
OVERALL SECURITY
 Log everything
 Use Kubectl to access containers, to limit ssh access
 Apply resource quota and limits with Kubernetes
namespaces
 Network segregation through Kubernetes clusters
13
PROTECTING AGAINST MALICIOUS
CONTAINERS
 Local
 Run unprivileged
 Run with user namespace
 Containers data (volumes) on separate partition
 Aqua
 Network
 Deny network access
 No internet access to backend cluster
 Communication between clusters is limited to absolute
minimum
14
FORK BOMB
 :(){ :|:& };:
 Exhausts PIDs
 System freezes
15
FORK BOMB PROTECTION
 nproc
 ulimit –u 100
 Limit per user per session
 Can be done either for docker daemon or per container
 Doesn’t enforce for root
 PID cgroup
 Future, kernel 4.3
FORK BOMB DEMO
17
SO WITH A LITTLE HELP
THANK YOU
Michael Cherny
cherny@aquasec.com
@chernymi

More Related Content

Viewers also liked

Viewers also liked (13)

Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
 
Veer's Container Security
Veer's Container SecurityVeer's Container Security
Veer's Container Security
 
Monetising Your Skill
Monetising Your SkillMonetising Your Skill
Monetising Your Skill
 
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
 
Docker Security workshop slides
Docker Security workshop slidesDocker Security workshop slides
Docker Security workshop slides
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Security best practices for kubernetes deployment
Security best practices for kubernetes deploymentSecurity best practices for kubernetes deployment
Security best practices for kubernetes deployment
 
Monitoring, Logging and Tracing on Kubernetes
Monitoring, Logging and Tracing on KubernetesMonitoring, Logging and Tracing on Kubernetes
Monitoring, Logging and Tracing on Kubernetes
 
Docker Security - Secure Container Deployment on Linux
Docker Security - Secure Container Deployment on LinuxDocker Security - Secure Container Deployment on Linux
Docker Security - Secure Container Deployment on Linux
 
London HUG 19/5 - Kubernetes and vault
London HUG 19/5 - Kubernetes and vaultLondon HUG 19/5 - Kubernetes and vault
London HUG 19/5 - Kubernetes and vault
 
Container Orchestration Wars
Container Orchestration WarsContainer Orchestration Wars
Container Orchestration Wars
 
Docker Security Overview
Docker Security OverviewDocker Security Overview
Docker Security Overview
 

Recently uploaded

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Recently uploaded (20)

Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 

Running security service in gcloud

  • 1. Copyright @ 2016 Aqua Security Software Ltd. All Rights Reserved. Running a Security Service in gcloud Michael Cherny Head of Research
  • 2. 2 WHO AM I  Head of Security Research at Aqua Security, a leader in container security  20 years of building security products, development and research  Held senior security research positions at Microsoft, Aorato and Imperva.  Presented at security conferences, among them, BlackHat Europe, RSA Europe and Virus Bulleting.
  • 3. 3 PEEKR  Scans for known vulnerabilities (CVEs)  Profiles container activities on host and network  Automatically runs the image and checks it against malicious behaviors  Highlights suspicious container behavior  Free (no credit card needed for registration)  https://peekr.aquasec.com
  • 5. 5 YOU WERE SAYING...  Automatically runs the image and checks it against malicious behaviors  Meaning we are running arbitrary, unknown containers on our infrastructure  Every time we consulted people and organizations, we got same response...
  • 6. 6 YOU ARE CRAZY INSANE, NUTS, KOOKY, WACKY...
  • 7. 7 ARCHITECTURAL REQUIREMENTS  Scalable web front end  Scalable Scanner workers  Asynchronous processing  Security
  • 8. 8 SECURITY CONCERNS  Web front end  Malicious containers  Exploding containers  Lateral movement  Attacking from our infrastructure
  • 9. 9 MALICIOUS CONTAINERS  Local behavior  Fork Bomb  Fallocate  Resource consumption  Network  East-West  North-East
  • 11. 11 PEEKR ARCHITECTURE OVERVIEW Front end cluster Front end Service Web Queue CVEs Back end cluster Scanner
  • 12. 12 OVERALL SECURITY  Log everything  Use Kubectl to access containers, to limit ssh access  Apply resource quota and limits with Kubernetes namespaces  Network segregation through Kubernetes clusters
  • 13. 13 PROTECTING AGAINST MALICIOUS CONTAINERS  Local  Run unprivileged  Run with user namespace  Containers data (volumes) on separate partition  Aqua  Network  Deny network access  No internet access to backend cluster  Communication between clusters is limited to absolute minimum
  • 14. 14 FORK BOMB  :(){ :|:& };:  Exhausts PIDs  System freezes
  • 15. 15 FORK BOMB PROTECTION  nproc  ulimit –u 100  Limit per user per session  Can be done either for docker daemon or per container  Doesn’t enforce for root  PID cgroup  Future, kernel 4.3
  • 17. 17 SO WITH A LITTLE HELP

Editor's Notes

  1. Two words about me, one word about Aqua