SlideShare a Scribd company logo
1 of 18
Copyright @ 2016 Aqua Security Software Ltd. All Rights Reserved.
Running a Security
Service in gcloud
Michael Cherny
Head of Research
2
WHO AM I
 Head of Security Research at Aqua Security, a leader
in container security
 20 years of building security products, development
and research
 Held senior security research positions at Microsoft,
Aorato
and Imperva.
 Presented at security conferences, among them,
BlackHat Europe, RSA Europe and Virus Bulleting.
3
PEEKR
 Scans for known vulnerabilities (CVEs)
 Profiles container activities on host and network
 Automatically runs the image and checks it against malicious
behaviors
 Highlights suspicious container behavior
 Free (no credit card needed for registration)
 https://peekr.aquasec.com
4
PEEKR
5
YOU WERE SAYING...
 Automatically runs the image and checks it against
malicious behaviors
 Meaning we are running arbitrary, unknown containers
on our infrastructure
 Every time we consulted people and organizations, we
got same response...
6
YOU ARE CRAZY
INSANE, NUTS, KOOKY,
WACKY...
7
ARCHITECTURAL REQUIREMENTS
 Scalable web front end
 Scalable Scanner workers
 Asynchronous processing
 Security
8
SECURITY CONCERNS
 Web front end
 Malicious containers
 Exploding containers
 Lateral movement
 Attacking from our infrastructure
9
MALICIOUS CONTAINERS
 Local behavior
 Fork Bomb
 Fallocate
 Resource consumption
 Network
 East-West
 North-East
10
IMPLEMENTATION
 Kubernetes
 Security
 Kubernetes
 Aqua
11
PEEKR ARCHITECTURE OVERVIEW
Front end cluster
Front
end
Service
Web
Queue
CVEs
Back end cluster
Scanner
12
OVERALL SECURITY
 Log everything
 Use Kubectl to access containers, to limit ssh access
 Apply resource quota and limits with Kubernetes
namespaces
 Network segregation through Kubernetes clusters
13
PROTECTING AGAINST MALICIOUS
CONTAINERS
 Local
 Run unprivileged
 Run with user namespace
 Containers data (volumes) on separate partition
 Aqua
 Network
 Deny network access
 No internet access to backend cluster
 Communication between clusters is limited to absolute
minimum
14
FORK BOMB
 :(){ :|:& };:
 Exhausts PIDs
 System freezes
15
FORK BOMB PROTECTION
 nproc
 ulimit –u 100
 Limit per user per session
 Can be done either for docker daemon or per container
 Doesn’t enforce for root
 PID cgroup
 Future, kernel 4.3
FORK BOMB DEMO
17
SO WITH A LITTLE HELP
THANK YOU
Michael Cherny
cherny@aquasec.com
@chernymi

More Related Content

Viewers also liked

Viewers also liked (13)

Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
 
Veer's Container Security
Veer's Container SecurityVeer's Container Security
Veer's Container Security
 
Monetising Your Skill
Monetising Your SkillMonetising Your Skill
Monetising Your Skill
 
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
 
Docker Security workshop slides
Docker Security workshop slidesDocker Security workshop slides
Docker Security workshop slides
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Security best practices for kubernetes deployment
Security best practices for kubernetes deploymentSecurity best practices for kubernetes deployment
Security best practices for kubernetes deployment
 
Monitoring, Logging and Tracing on Kubernetes
Monitoring, Logging and Tracing on KubernetesMonitoring, Logging and Tracing on Kubernetes
Monitoring, Logging and Tracing on Kubernetes
 
Docker Security - Secure Container Deployment on Linux
Docker Security - Secure Container Deployment on LinuxDocker Security - Secure Container Deployment on Linux
Docker Security - Secure Container Deployment on Linux
 
London HUG 19/5 - Kubernetes and vault
London HUG 19/5 - Kubernetes and vaultLondon HUG 19/5 - Kubernetes and vault
London HUG 19/5 - Kubernetes and vault
 
Container Orchestration Wars
Container Orchestration WarsContainer Orchestration Wars
Container Orchestration Wars
 
Docker Security Overview
Docker Security OverviewDocker Security Overview
Docker Security Overview
 

Recently uploaded

Jax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined DeckJax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined Deck
Marc Lester
 

Recently uploaded (20)

Auto Affiliate AI Earns First Commission in 3 Hours..pdf
Auto Affiliate  AI Earns First Commission in 3 Hours..pdfAuto Affiliate  AI Earns First Commission in 3 Hours..pdf
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
 
Transformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with LinksTransformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with Links
 
Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Era
 
^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto
^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto
^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto
 
What is a Recruitment Management Software?
What is a Recruitment Management Software?What is a Recruitment Management Software?
What is a Recruitment Management Software?
 
Lessons Learned from Building a Serverless Notifications System.pdf
Lessons Learned from Building a Serverless Notifications System.pdfLessons Learned from Building a Serverless Notifications System.pdf
Lessons Learned from Building a Serverless Notifications System.pdf
 
Optimizing Operations by Aligning Resources with Strategic Objectives Using O...
Optimizing Operations by Aligning Resources with Strategic Objectives Using O...Optimizing Operations by Aligning Resources with Strategic Objectives Using O...
Optimizing Operations by Aligning Resources with Strategic Objectives Using O...
 
The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)
 
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
 
Effective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeConEffective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeCon
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdfStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
 
^Clinic ^%[+27788225528*Abortion Pills For Sale In harare
^Clinic ^%[+27788225528*Abortion Pills For Sale In harare^Clinic ^%[+27788225528*Abortion Pills For Sale In harare
^Clinic ^%[+27788225528*Abortion Pills For Sale In harare
 
From Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST APIFrom Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST API
 
Food Delivery Business App Development Guide 2024
Food Delivery Business App Development Guide 2024Food Delivery Business App Development Guide 2024
Food Delivery Business App Development Guide 2024
 
Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14
 
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
 
Jax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined DeckJax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined Deck
 
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit MilanWorkshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
 
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
 

Running security service in gcloud

  • 1. Copyright @ 2016 Aqua Security Software Ltd. All Rights Reserved. Running a Security Service in gcloud Michael Cherny Head of Research
  • 2. 2 WHO AM I  Head of Security Research at Aqua Security, a leader in container security  20 years of building security products, development and research  Held senior security research positions at Microsoft, Aorato and Imperva.  Presented at security conferences, among them, BlackHat Europe, RSA Europe and Virus Bulleting.
  • 3. 3 PEEKR  Scans for known vulnerabilities (CVEs)  Profiles container activities on host and network  Automatically runs the image and checks it against malicious behaviors  Highlights suspicious container behavior  Free (no credit card needed for registration)  https://peekr.aquasec.com
  • 5. 5 YOU WERE SAYING...  Automatically runs the image and checks it against malicious behaviors  Meaning we are running arbitrary, unknown containers on our infrastructure  Every time we consulted people and organizations, we got same response...
  • 6. 6 YOU ARE CRAZY INSANE, NUTS, KOOKY, WACKY...
  • 7. 7 ARCHITECTURAL REQUIREMENTS  Scalable web front end  Scalable Scanner workers  Asynchronous processing  Security
  • 8. 8 SECURITY CONCERNS  Web front end  Malicious containers  Exploding containers  Lateral movement  Attacking from our infrastructure
  • 9. 9 MALICIOUS CONTAINERS  Local behavior  Fork Bomb  Fallocate  Resource consumption  Network  East-West  North-East
  • 11. 11 PEEKR ARCHITECTURE OVERVIEW Front end cluster Front end Service Web Queue CVEs Back end cluster Scanner
  • 12. 12 OVERALL SECURITY  Log everything  Use Kubectl to access containers, to limit ssh access  Apply resource quota and limits with Kubernetes namespaces  Network segregation through Kubernetes clusters
  • 13. 13 PROTECTING AGAINST MALICIOUS CONTAINERS  Local  Run unprivileged  Run with user namespace  Containers data (volumes) on separate partition  Aqua  Network  Deny network access  No internet access to backend cluster  Communication between clusters is limited to absolute minimum
  • 14. 14 FORK BOMB  :(){ :|:& };:  Exhausts PIDs  System freezes
  • 15. 15 FORK BOMB PROTECTION  nproc  ulimit –u 100  Limit per user per session  Can be done either for docker daemon or per container  Doesn’t enforce for root  PID cgroup  Future, kernel 4.3
  • 17. 17 SO WITH A LITTLE HELP

Editor's Notes

  1. Two words about me, one word about Aqua