cloud conf keynote - orchestrating least privilege

49
Orchestrating Least Privilege

Upload: diogo-monica

Post on 22-Mar-2017

189 views

Category:

Internet


6 download

TRANSCRIPT

Page 1: Cloud conf keynote - Orchestrating Least Privilege

Orchestrating Least Privilege

Page 2: Cloud conf keynote - Orchestrating Least Privilege

~2000 Today

Page 3: Cloud conf keynote - Orchestrating Least Privilege

What is an Orchestrator?

Page 4: Cloud conf keynote - Orchestrating Least Privilege

What is an Orchestra?

Page 5: Cloud conf keynote - Orchestrating Least Privilege
Page 6: Cloud conf keynote - Orchestrating Least Privilege
Page 7: Cloud conf keynote - Orchestrating Least Privilege
Page 8: Cloud conf keynote - Orchestrating Least Privilege
Page 9: Cloud conf keynote - Orchestrating Least Privilege
Page 10: Cloud conf keynote - Orchestrating Least Privilege

SWARM

Page 11: Cloud conf keynote - Orchestrating Least Privilege

Job of a Conductor

- Casting - Assign sheet music - Unify performers - Set the tempo

Page 12: Cloud conf keynote - Orchestrating Least Privilege

Job of an Orchestrator

- Node management - Task assignment - Cluster state reconciliation - Resource Management

Page 13: Cloud conf keynote - Orchestrating Least Privilege

What is a Least Privilege Orchestrator?

Page 14: Cloud conf keynote - Orchestrating Least Privilege

What is Least Privilege?

Page 15: Cloud conf keynote - Orchestrating Least Privilege
Page 16: Cloud conf keynote - Orchestrating Least Privilege

A process must be able to access only the information and resources that are necessary for its legitimate purpose.

Principle of Least Privilege

Page 17: Cloud conf keynote - Orchestrating Least Privilege

An Orchestrator that follows the principle of least privilege in the

strictest manner possible.Least Privilege Orchestrator

Page 18: Cloud conf keynote - Orchestrating Least Privilege

Why Least Privilege?

Page 19: Cloud conf keynote - Orchestrating Least Privilege
Page 20: Cloud conf keynote - Orchestrating Least Privilege

Cluster

Internet

Page 21: Cloud conf keynote - Orchestrating Least Privilege
Page 22: Cloud conf keynote - Orchestrating Least Privilege

Cluster

Internet

A

Page 23: Cloud conf keynote - Orchestrating Least Privilege
Page 24: Cloud conf keynote - Orchestrating Least Privilege

M

M M

AA A

Page 25: Cloud conf keynote - Orchestrating Least Privilege
Page 26: Cloud conf keynote - Orchestrating Least Privilege

M

M M

WW W

Page 27: Cloud conf keynote - Orchestrating Least Privilege
Page 28: Cloud conf keynote - Orchestrating Least Privilege

M

M M

WW W

Page 29: Cloud conf keynote - Orchestrating Least Privilege

How far away are we right now?

Page 30: Cloud conf keynote - Orchestrating Least Privilege
Page 31: Cloud conf keynote - Orchestrating Least Privilege

How do we achieve Least Privilege Orchestration?

Page 32: Cloud conf keynote - Orchestrating Least Privilege

Mitigating External Attacker

web: image: web-app expose: 443 links: - redis redis: image: redis

Page 33: Cloud conf keynote - Orchestrating Least Privilege

Mitigating Internal Network Attacker

[ { "permission": { "method": "GET", "resource": "/user" }, "allow": ["web", "fulfillment", "payments"] },

{ "permission": { "method": "POST", "resource": "/user" }, "allow": ["signup", "web"] },

{ "permission": { "method": "DELETE", "resource": "/user/.*" }, "allow": ["web"] }]

Page 34: Cloud conf keynote - Orchestrating Least Privilege

Mitigating MiTM Attacker

rails-app: image: rails-app links: - mysql mysql: image: mysql

MTLS

Page 35: Cloud conf keynote - Orchestrating Least Privilege

Mitigating Malicious Worker

Push

Worker

Manager

WorkerWorker

Page 36: Cloud conf keynote - Orchestrating Least Privilege

Mitigating Malicious Manager

Worker

Manager

WorkerWorker

web: image: web-app expose: 443 links: - redis tls-auth: - OU: api-client redis: image: redis

web: image: web-app expose: 443 links: web:

image: web-app expose: 443 links:

web: image: web-app expose: 443 links:

Page 37: Cloud conf keynote - Orchestrating Least Privilege

SWARM

Page 38: Cloud conf keynote - Orchestrating Least Privilege
Page 39: Cloud conf keynote - Orchestrating Least Privilege

Mutual TLS by default

• First node generates a new self-signed CA.

Page 40: Cloud conf keynote - Orchestrating Least Privilege

Mutual TLS by default

• New nodes can get a certificate issued w/ a token.

Page 41: Cloud conf keynote - Orchestrating Least Privilege

Mutual TLS by default

• Workers and managers identified by their certificate.

Page 42: Cloud conf keynote - Orchestrating Least Privilege

Mutual TLS by default

• Communications secured with Mutual TLS.

Page 43: Cloud conf keynote - Orchestrating Least Privilege
Page 44: Cloud conf keynote - Orchestrating Least Privilege

Secrets

Page 45: Cloud conf keynote - Orchestrating Least Privilege

Secrets

Page 46: Cloud conf keynote - Orchestrating Least Privilege

Secrets

External APP

Page 47: Cloud conf keynote - Orchestrating Least Privilege
Page 48: Cloud conf keynote - Orchestrating Least Privilege
Page 49: Cloud conf keynote - Orchestrating Least Privilege

Thank you