The security implications of running software in containers
Taming Container Fears
Scott McCarty
Principal Product Manager, Containers - RHEL & OpenShift
05/14/2019
“Just because you're paranoid doesn't mean they aren't after you.”
THE PROBLEMS
CONTAINERS DON’T CONTAIN
Dan Walsh (my shirt is dedicated to you)
Move the kernel around or move the user space around
4
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
CONTAINER IMAGES
Currency for collaboration
Developers, operations, middleware, performance, and security specialists all have a role to play
5
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
Hard Work
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
NEW CONCEPTS
CIA
CONFIDENTIALITY
Has data leaked from the container platform?
Has somebody tampered with the container?
INTEGRITY
Is the container up and running?
AVAILABILITY
Not them, but yeah, they might be after you too….
8
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
Integrity
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
Defense in Depth
the practice of arranging defensive lines or fortifications so that they can defend each other, especially in case of an enemy incursion.
Can we harden each layer?
10
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
The Tenancy Scale
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
Security Controls
SELinux
Who you can talk to. Which objects in the kernel can communicate with other objects.
SECCOMP
What you can say. Limiting system calls is like limiting what words can be said
NEW TECHNICAL CONTROLS
CONTAINER IMAGES
Our current operating model controls:
Containers add the ability to easily apply techniques such as:
14
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
CONTAINER HOST
Many of these techniques, we apply today.
Since containers are just fancy processes with a well-controlled user space, it’s easier to apply techniques like:
15
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
CONTAINER PLATFORM
This layer exists in the world of physical and virtual servers but is typically an administrator only tool, such as vCenter or HPSA. In the world of containers, it’s much more common to delegate some access to developers, architects, and application owners.
16
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
STANDARD WEB APPLICATION
Many security controls are inconvenient
Benefits
Limitations
17
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
CONTAINERIZED WEB APPLICATION
Many security controls are essentially free
Benefits
Limitations
18
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
Questions?
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
Citations
By Scott McCarty @fatherlinux
Scott McCarty. Twitter: @fatherlinux Blog: bit.ly/fatherlinux
For help getting started, visit http://brand.redhat.com/applications/presentations
to download the official Red Hat Presentation Guide
For more information on how to use this template within Google Slides, view this step-by-step guide.
RH_PREStemp_169_dark_v1.1_011116
THANK YOU
plus.google.com/+RedHat
linkedin.com/company/red-hat
youtube.com/user/RedHatVideos
facebook.com/redhatinc
twitter.com/RedHatNews
Load Applications at the Factory, not the Dock
Scott McCarty, Red Hat