virtual machines vs. containers vs. unikernels: the … id: #rsac samir saklikar virtual machines...

28
SESSION ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office of the CTO, Security Group, Cisco

Upload: lynhan

Post on 27-May-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

SESSION ID:

#RSAC

Samir Saklikar

Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs

CCS-T08

Technical Lead, Office of the CTO, Security Group,Cisco

Page 2: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Agenda

Workload Execution EnvironmentsVirtualization, Containers, Unikernels

A Security Requirements Template

Built-In Security Defenses of Workload Execution Units

Applying Higher Level Security Policy to Workloads

Apply

2

Page 3: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

What are we working with?

Heterogeneous Multi Form-Factor Workload Execution Units

Page 4: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Virtual Machines

Physical Hardware

Hypervisor

Virtualized Hardware

Operating System

App App

Virtualized Hardware

Operating System

App App

Virtualized Hardware

Operating System

App App

Operating System

4

Page 5: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Containers

Physical Hardware

Host Operating System

Binary and Libraries

App

Binary and Libraries

App App App App App

5

Page 6: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Containers within VMs (for Tenant Isolation)

Physical Hardware

Guest OS

Binary and Libraries

App

Binary and Libraries

App App App App App

Guest OS

Hypervisor

Operating System

6

Page 7: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Unikernels (Specialized Kernel)

Physical Hardware

Hypervisor

Operating System

Minimal Kernel

App

Minimal Binaries/Libraries

App

Minimal Kernel

Minimal Binaries/Libraries

7

Page 8: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

What do we want ?

Our Security Requirements

Page 9: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

What is “Security” for Workloads?

Protect one-self? ”Well-Behaved” applications?

Defense against Attacks?

Policy Compliance

9

Page 10: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

“Whole is Greater than Sum of its Parts”

Orchestrated Security Defense Mechanisms Built-In Standalone Defense Mechanisms

10

Page 11: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Built-In Standalone Defense Mechanisms

Software HardeningSecurity Audits, Security Upgrades

Strong Root of Trust

Granular Access Control Model

11

Page 12: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Orchestrated Security Defense

Driven by a higher level Operational Policy

Business Rule, Compliance Policy, Reactive Action

Collaborative Defense with real-time Intelligence Sharing

Unified Management across hybrid deployments

Full Stack Visibility and Behavioral Analytics

Easy Composability

12

Page 13: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

A Security Requirements Template

Smaller Footprint, Better Security Audit and Hardening

Built-in Protection, Access Control, Permissions, Capabilities

Hardened Workload Execution Environment Business-Centric

Identity and Rights Management

Operational Policy, Compliance Rules

Workload Isolation, Firewalls, Access Control

Data Protection, Encryption, Access Control

Federated Access, Secure Cloud Deployments

Unified Management, Auditing, Remediation Plans

Workload Security Life Cycle

13

Page 14: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Built-In Security Defenses

Fundamental Security Capabilities of Workload Environments

Page 15: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

VM Security (aka Hypervisor Security)

Execution Isolation Devices Emulation & Access Control

Privileged Operations

Management

Secure Trusted Boot

Security Audit & Hardening Hardware Assisted

VirtualizationGranular Access

Control

15

Page 16: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Hypervisor Security (cont.)

Other Recommendations…Regular Security Updates and Patches

Configuration Versioning with Rollbacks

Secure Configuration of Built-in Firewall

Segregating VM Management and Hypervisor Host and VM Traffic

More at NIST Publication - “Security Recommendations for Hypervisor Deployment”

16

Page 17: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Container Security

Execution Isolation Privileged Operations

Management

Security Audit & Hardening Granular Access

Control

Reduced Attack Surface

Vulnerability Management

17

Page 18: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Nuts & Bolts:Linux Namespaces

1

2 3

4 5

Container

Parent

1

2 3

PID Namespaces

Global Net Namespace

Container Net Namespace

Container Net Namespace

Network Namespaces

/disk

/disk

/disk

Mount Namespaces

IPC1

IPC1

IPC1

IPC Namespaces

18

Page 19: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Linux Cgroups & Capabilities

https://mairin.wordpress.com/2011/05/13/ideas-for-a-cgroups-ui/

c1c2

c3

c4

c5

c6

c7 c8

c9

c11

c10c12

c13

c14

c15c16

c17

c18

Total Capabilities

Container Capabilities

19

Page 20: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

SELinux

Ref - http://blog.linuxgrrl.com/2014/04/16/the-selinux-coloring-book/

20

Page 21: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Security Defense Orchestration

Mapping Higher Level Operational Policies to Security Primitives

Page 22: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Importance of An Operational Policy

Smaller Footprint, Better Security Audit and Hardening

Built-in Protection, Access Control, Permissions, Capabilities

Hardened Workload Execution Environment Business-Centric

Identity and Rights Management

Operational Policy, Compliance Rules

Workload Isolation, Firewalls, Access Control

Data Protection, Encryption, Access Control

Federated Access, Secure Cloud Deployments

Unified Management, Auditing, Remediation Plans

Workload Security Life Cycle

22

Page 23: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Inspiration from Policy Defined Networking

Policy Driven Application Composition

Promise-Theory Driven

Security is Implicit – Zero Trust Model

Multi-Level Policy Formats derived from higher level Policy

23

Page 24: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Building a Policy Format…

VM1 Container1

UniKernel

Endpoint Group - 1

VM2 Container2

A Logical Collection of Workload Units driven by a common policy requirement

VM1 Container1

UniKernel

Endpoint Group - 2

VM2 Container2

Contract Filter, Action, Label

Filter, Action, Label

Allow,Deny,Mark

24

Page 25: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

... with pluggable Extensibility.

VM1 Container1

UniKernel

Endpoint Group - 1

VM2 Container2

A Logical Collection of Workload Units driven by a common policy requirement

VM1 Container1

UniKernel

Endpoint Group - 2

VM2 Container2

Contract Intrusion Detection

Data Protection

Traffic Encryption

.

.

.

Service GraphInsertion

25

Page 26: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Operationalizing the Security Policy

Contract

SDN Controller Docker Engine Plugin Unified Controller

Virtual Machines ContainersVirtual Machines

Containers

26

Page 27: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Apply What You Have Learned Today

Next Week you should:Understand your Workload Environment Composition – Distribution across VM, Containers and why is it so?

Understand Built-In Security Capabilities of your Workload Environments. Last Hardening Audit, Enabled Capabilities for your Containers, VM Configurations etc.

In three months, you should:Identify the best workload unit composition (VM, Container etc.) for the type of your workloads

Investigate and Setup a Unified Software Patch and Upgrade policy for your workload units

Identify your high-level Operational Policy Set and check if and how it is enforced on your workloads

In six months, you should:Setup a mechanism to operationalize your high-level business policy uniformly across different workload environments

27

Page 28: Virtual Machines vs. Containers vs. Unikernels: The … ID: #RSAC Samir Saklikar Virtual Machines vs. Containers vs. Unikernels: The Security Face-Offs CCS-T08 Technical Lead, Office

#RSAC

Thanks & Questions

Email – [email protected]