SlideShare a Scribd company logo
Least-privilege Microservices
Diogo Mónica
Nathan McCauley
Agenda
• Why least-privilege
• History of least-privilege
• Least-privilege with Docker
• Ongoing and future work
• Conclusions
“Every process must be able to access only the
information and resources that are necessary for its
legitimate purpose”
Front-end
Server
Database
Auth Service
1990
Internet
All-in-one
2000
Internet
DatabasesServicesFront-end
2010
Internet
DockerCon SF 2015: Docker Security
Server
Host OS
Docker Engine
AppA
AppB
AppC
AppD
AppE
AppF
libraries
Container
One Process
Today
Internet
‣A FE server has a very different security profile than a database or a worker host
‣Imagine that each container only has access exactly to the resources and APIs it
needs. No more, no less.
Front-end Server Back-end Server
‣Access to a lot of
downstream services
‣Most exposed
‣I/O intensive
‣Limited network access
Worker Host
‣CPU Intensive
‣Wide range of workloads
Profiles
‣A container is a process. Let’s find out what syscalls it needs.
Process Monitoring
‣Namespaces provide an isolated view of the system (Network, PID, etc)
‣Cgroups limit and isolate the resource usage of a collection of processes
‣Linux Security Modules give us a MAC (AppArmor, SELinux)
Fine-grained controls
Fine-grained controls
‣Capabilities divides the privileges of root into distinct units (bind, chown, etc)
‣Per-container ulimit (since 1.6)
‣User-namespaces: root inside is not root outside (remapped root for 1.8)
‣Seccomp: Individual syscall filtering (working on my laptop)
Safer by default
‣Less than half the Linux capabilities by
default
‣Copy-on-write ensures immutability
‣No device access by default
‣Default AppArmor and SELinux profiles
for an increasing number of containers
Safer by default
‣Smaller footprint
‣Remove all unneeded packages
‣Remove all unneeded users
‣Remove all suid binaries
…
Debia
n
Security Profiles
Debia
n
‣Producers of containers should be responsible for creating adequate profiles
‣Profile gets shipped with the container
‣Aggregates all of the different isolation mechanisms into one single profile
Securing the Ecosystem
Debia
n
User-namespaces Seccomp Provenance
Selinux Kerberos
Intro to Container Security
Debia
n
http://bit.ly/1M4O9XE
Docker Bench
Debia
n
https://dockerbench.com/
‣Fully automated
‣Shipped as a container that tests containers
Conclusion
‣Docker is on the path to support least-privilege microservices, since it allows
fine-grained control over what access each container should have.
‣We will need easier tooling to define per-container security profiles
‣You can help!
#docker-security on Freenode
Thank you
diogo@docker.com
nathan.mccauley@docker.com

More Related Content

PDF
Docker 1.11 Meetup: Containerd and runc, by Arnaud Porterie and Michael Crosby
PDF
The Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori
PDF
Troubleshooting Tips from a Docker Support Engineer
PDF
Docker Introduction
PPT
Docker introduction
PDF
Docker introduction
PDF
Tokyo OpenStack Summit 2015: Unraveling Docker Security
PDF
Secure Substrate: Least Privilege Container Deployment
Docker 1.11 Meetup: Containerd and runc, by Arnaud Porterie and Michael Crosby
The Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori
Troubleshooting Tips from a Docker Support Engineer
Docker Introduction
Docker introduction
Docker introduction
Tokyo OpenStack Summit 2015: Unraveling Docker Security
Secure Substrate: Least Privilege Container Deployment

What's hot (20)

PDF
Advanced Docker Developer Workflows on MacOS X and Windows
PDF
Docker and the Linux Kernel
PDF
Veer's Container Security
PDF
Docker Introduction
PDF
Building a Secure App with Docker - Ying Li and David Lawrence, Docker
PDF
Docker London: Container Security
PDF
Deep Dive in Docker Overlay Networks - Laurent Bernaille - Architect, D2SI
PDF
Docker - introduction
PDF
Dockerizing your applications - Docker workshop @Twitter
PDF
Introduction to Containers - SQL Server and Docker
PDF
Docker Security and Content Trust
PDF
Docker presentation | Paris Docker Meetup
PDF
Docker Security Deep Dive by Ying Li and David Lawrence
PPTX
Docker introduction
PDF
How Secure Is Your Container? ContainerCon Berlin 2016
PDF
Containers technologies
PDF
Orchestrating Docker containers at scale
PDF
What Have Namespaces Done for you Lately? Liz Rice, Aqua Security
PDF
Docker Presentation at the OpenStack Austin Meetup | 2013-09-12
PDF
Docker: the road ahead
Advanced Docker Developer Workflows on MacOS X and Windows
Docker and the Linux Kernel
Veer's Container Security
Docker Introduction
Building a Secure App with Docker - Ying Li and David Lawrence, Docker
Docker London: Container Security
Deep Dive in Docker Overlay Networks - Laurent Bernaille - Architect, D2SI
Docker - introduction
Dockerizing your applications - Docker workshop @Twitter
Introduction to Containers - SQL Server and Docker
Docker Security and Content Trust
Docker presentation | Paris Docker Meetup
Docker Security Deep Dive by Ying Li and David Lawrence
Docker introduction
How Secure Is Your Container? ContainerCon Berlin 2016
Containers technologies
Orchestrating Docker containers at scale
What Have Namespaces Done for you Lately? Liz Rice, Aqua Security
Docker Presentation at the OpenStack Austin Meetup | 2013-09-12
Docker: the road ahead
Ad

Viewers also liked (20)

PPT
Seven problems of Linux Containers
PDF
Docker, Linux Containers (LXC), and security
PDF
DockerCon SF 2015: DHE/DTR
PDF
Docker on the Raspberry Pi by Dieter Reuter (Hypriot)
PDF
DockerCon SF 2015: Ben Golub's Keynote Day 1
PPTX
DockerCon 15 Keynote - Day 2
PDF
DockerCon SF 2015: Keynote Day 1
PPTX
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
PDF
DockerCon SF 2015: AWS w/ Deepak Singh
PDF
Containerd: Building a Container Supervisor by Michael Crosby
PPTX
Thinking Inside the Container: A Continuous Delivery Story by Maxfield Stewart
PPTX
Docker Security workshop slides
PPTX
Docker Hub: Past, Present and Future by Ken Cochrane & BC Wong
PDF
Docker Registry V2
PDF
Is Docker Secure?
PDF
Docker Chicago Meetup - July 2014
PPTX
IoT Agents (With Lightweight M2M)
PDF
Containers, Docker, and Security: State Of The Union (LinuxCon and ContainerC...
PPTX
IoT Agents (Introduction)
PDF
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
Seven problems of Linux Containers
Docker, Linux Containers (LXC), and security
DockerCon SF 2015: DHE/DTR
Docker on the Raspberry Pi by Dieter Reuter (Hypriot)
DockerCon SF 2015: Ben Golub's Keynote Day 1
DockerCon 15 Keynote - Day 2
DockerCon SF 2015: Keynote Day 1
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
DockerCon SF 2015: AWS w/ Deepak Singh
Containerd: Building a Container Supervisor by Michael Crosby
Thinking Inside the Container: A Continuous Delivery Story by Maxfield Stewart
Docker Security workshop slides
Docker Hub: Past, Present and Future by Ken Cochrane & BC Wong
Docker Registry V2
Is Docker Secure?
Docker Chicago Meetup - July 2014
IoT Agents (With Lightweight M2M)
Containers, Docker, and Security: State Of The Union (LinuxCon and ContainerC...
IoT Agents (Introduction)
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
Ad

Similar to DockerCon SF 2015: Docker Security (20)

PDF
Docker security microservices
PDF
DockerDay2015: Docker Security
PDF
Docker introduction
PPTX
Docker-Intro
PPTX
OpenStack Summit
PPTX
Docker SF Meetup January 2016
PPTX
Docker Security
PDF
Dockers zero to hero
PPTX
Docker - Demo on PHP Application deployment
PDF
Navigating container technology for enhanced security by Niklas Saari
PDF
Demystifying Containerization Principles for Data Scientists
PDF
5 Ways to Secure Your Containers for Docker and Beyond
PDF
Introduction to Docker
PDF
Evoluation of Linux Container Virtualization
PDF
Evolution of Linux Containerization
PPTX
Container & kubernetes
PPTX
Building Distributed Systems without Docker, Using Docker Plumbing Projects -...
PDF
Revolutionizing the cloud with container virtualization
PPTX
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
PDF
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Docker security microservices
DockerDay2015: Docker Security
Docker introduction
Docker-Intro
OpenStack Summit
Docker SF Meetup January 2016
Docker Security
Dockers zero to hero
Docker - Demo on PHP Application deployment
Navigating container technology for enhanced security by Niklas Saari
Demystifying Containerization Principles for Data Scientists
5 Ways to Secure Your Containers for Docker and Beyond
Introduction to Docker
Evoluation of Linux Container Virtualization
Evolution of Linux Containerization
Container & kubernetes
Building Distributed Systems without Docker, Using Docker Plumbing Projects -...
Revolutionizing the cloud with container virtualization
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...

More from Docker, Inc. (20)

PDF
Containerize Your Game Server for the Best Multiplayer Experience
PDF
How to Improve Your Image Builds Using Advance Docker Build
PDF
Build & Deploy Multi-Container Applications to AWS
PDF
Securing Your Containerized Applications with NGINX
PDF
How To Build and Run Node Apps with Docker and Compose
PDF
Hands-on Helm
PDF
Distributed Deep Learning with Docker at Salesforce
PDF
The First 10M Pulls: Building The Official Curl Image for Docker Hub
PDF
Monitoring in a Microservices World
PDF
COVID-19 in Italy: How Docker is Helping the Biggest Italian IT Company Conti...
PDF
Predicting Space Weather with Docker
PDF
Become a Docker Power User With Microsoft Visual Studio Code
PDF
How to Use Mirroring and Caching to Optimize your Container Registry
PDF
Monolithic to Microservices + Docker = SDLC on Steroids!
PDF
Kubernetes at Datadog Scale
PDF
Labels, Labels, Labels
PDF
Using Docker Hub at Scale to Support Micro Focus' Delivery and Deployment Model
PDF
Build & Deploy Multi-Container Applications to AWS
PDF
From Fortran on the Desktop to Kubernetes in the Cloud: A Windows Migration S...
PDF
Developing with Docker for the Arm Architecture
Containerize Your Game Server for the Best Multiplayer Experience
How to Improve Your Image Builds Using Advance Docker Build
Build & Deploy Multi-Container Applications to AWS
Securing Your Containerized Applications with NGINX
How To Build and Run Node Apps with Docker and Compose
Hands-on Helm
Distributed Deep Learning with Docker at Salesforce
The First 10M Pulls: Building The Official Curl Image for Docker Hub
Monitoring in a Microservices World
COVID-19 in Italy: How Docker is Helping the Biggest Italian IT Company Conti...
Predicting Space Weather with Docker
Become a Docker Power User With Microsoft Visual Studio Code
How to Use Mirroring and Caching to Optimize your Container Registry
Monolithic to Microservices + Docker = SDLC on Steroids!
Kubernetes at Datadog Scale
Labels, Labels, Labels
Using Docker Hub at Scale to Support Micro Focus' Delivery and Deployment Model
Build & Deploy Multi-Container Applications to AWS
From Fortran on the Desktop to Kubernetes in the Cloud: A Windows Migration S...
Developing with Docker for the Arm Architecture

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
KodekX | Application Modernization Development
Modernizing your data center with Dell and AMD
Building Integrated photovoltaic BIPV_UPV.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Encapsulation theory and applications.pdf
NewMind AI Monthly Chronicles - July 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...
Machine learning based COVID-19 study performance prediction
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
NewMind AI Weekly Chronicles - August'25 Week I
KodekX | Application Modernization Development

DockerCon SF 2015: Docker Security