Securing the Infrastructure and the Workloads of Linux Containers

Security R&D Engineer um IBM
1. Oct 2015
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
Securing the Infrastructure and the Workloads of Linux Containers
1 von 24

Más contenido relacionado

Was ist angesagt?

Virtualization Vs. ContainersVirtualization Vs. Containers
Virtualization Vs. Containersactualtechmedia
Securing the CloudSecuring the Cloud
Securing the CloudJohn Kinsella
Why containersWhy containers
Why containersLuca Ravazzolo
Application Virtualization SmackdownApplication Virtualization Smackdown
Application Virtualization SmackdownC/D/H Technology Consultants
5 Ways to Secure Your Containers for Docker and Beyond5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and BeyondBlack Duck by Synopsys
vSphere integrated containersvSphere integrated containers
vSphere integrated containersAtul Srivastava

Was ist angesagt?(20)

Destacado

Aux emferordenaAux emferordena
Aux emferordenaTrabajojunta El Foro
文件传输技术发展与产品趋势文件传输技术发展与产品趋势
文件传输技术发展与产品趋势PMCamp
Daniel Avidor - Deciphering the Viral Code – The Secrets of RedmatchDaniel Avidor - Deciphering the Viral Code – The Secrets of Redmatch
Daniel Avidor - Deciphering the Viral Code – The Secrets of RedmatchMIT Forum of Israel
Sex cake and your businessSex cake and your business
Sex cake and your businessGraham Brooks
مراجعة الصف الثانى الاعدادىمراجعة الصف الثانى الاعدادى
مراجعة الصف الثانى الاعدادىHanaa Ahmed
NdP_Akamon gana el primer premio “Who’s got game” como mejor startup de juego...NdP_Akamon gana el primer premio “Who’s got game” como mejor startup de juego...
NdP_Akamon gana el primer premio “Who’s got game” como mejor startup de juego...Akamon Entertainment

Similar a Securing the Infrastructure and the Workloads of Linux Containers

Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationKim Clark
AWS re:Invent 2016: Securing Container-Based Applications (CON402)AWS re:Invent 2016: Securing Container-Based Applications (CON402)
AWS re:Invent 2016: Securing Container-Based Applications (CON402)Amazon Web Services
AWS re:Invent 2016: Securing Container-Based Applications (CON402)AWS re:Invent 2016: Securing Container-Based Applications (CON402)
AWS re:Invent 2016: Securing Container-Based Applications (CON402)Amazon Web Services
Containers and workload security an overview Containers and workload security an overview
Containers and workload security an overview Krishna-Kumar
Cloud foundry Docker Openstack - Leading Open Source TriumvirateCloud foundry Docker Openstack - Leading Open Source Triumvirate
Cloud foundry Docker Openstack - Leading Open Source TriumvirateAnimesh Singh
IBM Container Service OverviewIBM Container Service Overview
IBM Container Service OverviewKyle Brown

Similar a Securing the Infrastructure and the Workloads of Linux Containers(20)

Último

Our Story, Orange NileOur Story, Orange Nile
Our Story, Orange NileManolodelaFuente1
Empowering Advanced Users: Extending OutSystems UI Framework with Openness an...Empowering Advanced Users: Extending OutSystems UI Framework with Openness an...
Empowering Advanced Users: Extending OutSystems UI Framework with Openness an...Bernardo Cardoso
Semantic Search_ NLP_ ML.pdfSemantic Search_ NLP_ ML.pdf
Semantic Search_ NLP_ ML.pdfPlamenaDzharadat
ROAD TO NODES - Intro to Neo4j + NeoDash.pdfROAD TO NODES - Intro to Neo4j + NeoDash.pdf
ROAD TO NODES - Intro to Neo4j + NeoDash.pdfNeo4j
Alliance Expedition BattleAlliance Expedition Battle
Alliance Expedition BattleSilver Caprice
Winter 24 Highlights.pdfWinter 24 Highlights.pdf
Winter 24 Highlights.pdfPatrickYANG48

Securing the Infrastructure and the Workloads of Linux Containers

Hinweis der Redaktion

  1. In a nutshell isolation less strong than vms
  2. Rely on | Cgroups to limit and account resource usage of the processes running inside the containers | Namespaces to provide a different view of the system resources for the process inside the container. Currently we have 6 | IPC | Network | Mount | PID | User | UTS. Not everything can be namespace. Privileged can attack and own the system. Power of super user has been divided into distinct units, known as capabilities, which can be independently enabled and disabled.
  3. Linux daemon in charge of managing the lifecycle of containers. Exposes RESTful APIs on a UNIX or HTTP Socket Public repository for container images
  4. We chose SystemTap since you can extend its script language using C code. We used this feature to query the kernel to get information about the privileged operation daemon and container processes
  5. we can safely grant /tmp directory that contains temporary files /usr/share is the place for manuals, documentations, examples
  6. Top 20 of Docker hub
  7. It operates in the testing environment so we don’t have overhead on production
  8. HIDS should be able to notify abnormal activities like if AppArmor has been disabled Poved to be very effectuve wiht attacks on Since our AppArmor profiles strictly check the mount flags, the execution of the container is blocked during its early stages Can not be written
  9. Injected Shocker code by overwriting the application startup script Any attempt to access the host file system triggers a security check with /shared as first level directory