Rahul Jadhav,
SPIFFE for Large Scale Telco Deployments: A Nephio Rationale
Identity & Entitlements
It is easier for a threat actor to log in versus hack in.
User Identity vs Workload Identity
User Identity
Workload Identity
aka NHI (Non Human Identity)
What about Access Tokens?
Problem with Access Tokens?
Security Solutions vying for this space
Secrets in Code Repositories
Secrets in S3 buckets, Google Storage, File Systems
Secrets hardcoded in IaC
Secrets in Kubernetes ConfigMaps
Credentials in Container Images
Secrets exposed during Runtime using env vars, configs etc
Workload Identity?
Doesn’t k8s solve this issue?
Workload 1
Workload 2
Authz
Is the service-account-workload1 allowed access to workload 2?
/var/run/secrets/kubernetes.io/serviceaccount/token
Use service account token in API request
API Server
The scope is only within the given k8s cluster.
Emergence of Workload Identity solutions
What is SPIFFE?
High Level SPIFFE Workflow
What is Nephio?
“The problems Nephio aims to solve start only once we try to operate at scale. The fact that our infrastructure, workloads, and workload configurations are all interconnected greatly increases the difficulty in managing these architectures at scale.”
Nephio: High Level Architecture
Why is SPIFFE relevant to Nephio?
Nephio Identity Requirements
Nephio Framework Requirements
Nepho Telco/5G Requirements
Nephio SPIFFE Implementation
Note: Nephio SPIFFE Integration PRs are still in review state.
Identity Federation
To sum it up