docker container security - a network view

23
1 A NETWORK VIEW OF DOCKER CONTAINERS You Can’t Secure What You Can’t See

Upload: neuvector

Post on 17-Feb-2017

143 views

Category:

Software


0 download

TRANSCRIPT

Page 1: Docker Container Security - A Network View

1

A NETWORK VIEW OF DOCKER CONTAINERSYou Can’t Secure What You Can’t See

Page 2: Docker Container Security - A Network View

2

AGENDA

▪Container Deployment Concerns▪Docker Security Basics▪Network View of Docker▪NACLs, Sec Groups, Flow

Logs etc…▪Summary

Sergey MotovylovetsSenior SW Operations Engineer | DevOpsCogniance

Glen KosakaVP Products & MarketingNeuVector

Page 3: Docker Container Security - A Network View

3

CONTAINERS: SECURITY CAN’T KEEP UPProduction Concerns▪Lack of Visibility▪Constant Change▪Transience▪DevOps Workflow

Mismatch▪Same Threats –

New Environment- DDOS, XSS… Persistent Attacks, Container

break-outs

Page 4: Docker Container Security - A Network View

4

THREATS – A REAL-WORLD EXAMPLE

Page 5: Docker Container Security - A Network View

5

DOCKER SECURITY - INTRO

Host and Docker daemon security

Images signingvulnerabilities scanning, content trust

Container runtime security

Network security

Page 6: Docker Container Security - A Network View

6

REVIEWING DOCKER BASICSBuilding blocks

cgroups(memory, CPU, block I/O and network limiting)

namespaces(PID, Network, Mount, UTS, IPC + User)

copy-on-write storage(layers represent differences)

Page 7: Docker Container Security - A Network View

7

DOCKER SECURITY BASICSHost and containers interaction

When combined with vDSO (virtual dynamic shared object) functionality - makes container breakout possible

Proof:

▪Containers don’t contain- not everything in Linux is

namespaced- kernel is shared

Page 8: Docker Container Security - A Network View

8

DOCKER SECURITY BASICSHost and daemon configuration

▪All-or-nothing default authorization model - limit access properly

▪Do centralized logging (and alerting)

▪Take advantage of TLS for registries and daemon itself

▪Keep software up to date!

Page 9: Docker Container Security - A Network View

9

DOCKER SECURITY BASICSImages signing, content trust

Enable content trust

Keep your registry up-to-date

Keep image minimal

Run security checks as a part of CI/CD pipelines, keep checking containers in a runtime

Page 10: Docker Container Security - A Network View

10

DOCKER SECURITY BASICSContainer runtime security

SELinux is your bro

Seccomp is another bro

Overlay is great for builds; production root fs should be running in read-only mode

Page 11: Docker Container Security - A Network View

11

NETWORK SECURITYSingle-node networking

▪Container network namespaces

▪Host network namespace

eth0 eth0

vethX vethY

docker0

eth0

Page 12: Docker Container Security - A Network View

12

NETWORK SECURITYMulti-node setup

eth0 eth0

vethX vethY

docker0

eth0

eth0 eth0

vethX vethY

docker0

eth0?

Node 1 Node 2

Page 13: Docker Container Security - A Network View

13

NETWORK SECURITY

OpenStack network architecture

Page 14: Docker Container Security - A Network View

14

NETWORK SECURITY

eth0 eth0

vethX vethY

docker0

eth0 eth0

vethX vethY

docker0Docker “security groups” applied here

Overlay network

Page 15: Docker Container Security - A Network View

15

NETWORK SECURITY

Separate network namespace

Page 16: Docker Container Security - A Network View

16

NETWORK SECURITY

▪tcpdump on host interface

▪and from within the overlay namespace

▪overlay network without encryption

Page 17: Docker Container Security - A Network View

17

NETWORK SECURITY

▪tcpdump on host interface

▪and from within the overlay namespace

▪encrypted overlay network

Page 18: Docker Container Security - A Network View

18

NETWORK SECURITY▪collecting traffic in a centralized manner

▪traffic is still encrypted though

Page 19: Docker Container Security - A Network View

19

NETWORK SECURITY▪figuring out an algorithm and encryption keys

▪decrypted traffic

Page 20: Docker Container Security - A Network View

20

CONTAINER MICROSEGMENTATION

▪Know container behavior▪Isolation at:

- Application (big)- Service (group))- Container (micro-

instance)

Page 21: Docker Container Security - A Network View

21

TAKEAWAYS▪Secure the Host and OS▪Secure the Container

Platform, Image, and Registry▪Monitor and Secure During

Run-time- Application specific- Network overlay agnostic- Real-time detection

Registry

ThreatsViolationsVulnerabilities

Run-

Tim

e D

ev /

Depl

oy

Page 22: Docker Container Security - A Network View

22

SOFTWARE OPERATIONS

▪System Architecture Development▪Security definitions and audit▪Monitoring and system metrics collection and analysis

▪Cloud Capacity planning and optimization▪Release Management and Deployment automation

▪Continuous Integration/ Delivery/ Deployment

Page 23: Docker Container Security - A Network View

23

QUESTIONS?For more information contact us:NeuVector: [email protected] http://neuvector.comCogniance: [email protected] http://www.cogniance.com