SlideShare a Scribd company logo
How secure is your container pipeline?
Manideep Konakandla
www.manideepk.com (@manideep_k1)
Feb 22, 2017
2
Who am I? Hmm, yeah - Shameless Bragging
• J.N Tata Scholar, ISC2 Scholar, RSA Conference Security Scholar etc.
• Masters Student (Graduating in May’17) + Security Researcher at CMU
• Authored a book on Info Sec & Ethical Hacking at the age of 21
• Featured in INDIA’s largest news papers and news channels
• 10 certifications + Trained 15,000+ people in Information Security
• Ex “Team Lead – Core Security & Data Analytics” at TCS
• Interest areas : Container Security, Application Security, System Security etc.
More details about me on www.manideepk.com
3
What am I up to with Containers?
• Co-author, Contributor for CIS Docker 1.12 & 1.13 benchmarks
• Extensive research at Carnegie Mellon (CMU)
• Presented findings at OWASP AppsecUSA, Bsides SF, RSA (Poster), Grehack etc.
• Cloud Security Research Intern @Adobe last Summer
4
Security skills can be taught
but
Security mindset comes only with passion
5
Before we start
6
What are we doing for next 40 mins?
 A.B.C.D….
• Containers in 45 seconds
• Container Pipeline, Risk Areas and our Scope
 Security
• Images
• Runtime
• Other components
• Enterprise zone
 Misc.
 Wrap up
7
What are we doing for next 40 mins?
 A.B.C.D….
• Containers in 45 seconds
• Container Pipeline, Risk Areas and our Scope
 Security
• Images
• Runtime
• Other components
• Enterprise zone
 Misc.
 Wrap up
8
Quick “60 second” Intro
Containers?
 Lightweight
 Application centric
 No more - “it works on my machine”
 Micro-services
Namespaces : Isolation (PID, User, Network, IPC,
Mount, UTS)
Cgroups : Isolates, limits and accounts resource
usage (CPU, memory etc.)
BUZZ……….!
Are containers
brand new?
Img Ref: www.docker.com
Containers in 45 seconds
9
Client <=> daemon
communication
Communication with public/private registry
Registry’s security
Host security Daemon security
Containers Images
Container Pipeline, Risk Areas and our Scope
Ref: Modified version of image on www.docker.com
10
What’s next?
 A.B.C.D….
• Containers in 45 seconds
• Container Pipeline, Risk Areas and our Scope
 Security
• Images
• Runtime
• Other components
• Enterprise zone
 Misc.
 Wrap up
11
Client <=> daemon
communication
Communication with public/private registry
Registry’s security
Host security Daemon security
Containers Images
Container Pipeline, Risk Areas and our Scope
Ref: Modified version of image on www.docker.com
12
Life cycle of an “Image”
Build Spin
Dockerfile Image Container
Maintaining images
13
Security in “Dockerfile” - Golden Rules
• Do not write secrets in Dockerfile (Info Disclosure - Twitter’s Vine). Use secret
management solutions
• Create a USER or else container will run as a root (Privilege escalation)
• Follow version pinning for images, packages (no ‘latest’) etc. (Caching Issue)
• Remove unnecessary setuid, setgid permissions (Privilege escalation)
• Download packages securely using GPG (MITM) and also do not download
unnecessary packages (Increased attack surface)
• Do not write any kind of update instructions alone in the Dockerfile (Caching)
• Use COPY instead of ADD (Increased attack surface)
• Use HEALTHCHECK command (Best practice)
• Use gosu instead of sudo wherever possible
• Try to restrict a image (/container) to one service
14
Building Images
15
Maintaining/ Consuming Images - Golden Rules
• Docker Content Trust
- Provides authenticity, integrity and freshness guarantees
- Takes some time to understand & prepare your own setup (worth it!)
• Vulnerability–free Images
- Tool selection : binary level analysis + hash based
• Except compatibility issues, all images and packages must be up-to-date
16
Client <=> daemon
communication
Communication with public/private registry
Registry’s security
Host security Daemon security
Containers Images
Container Pipeline, Risk Areas and our Scope
Ref: Modified version of image on www.docker.com
17
Container Runtime - Golden Rules
• Do not disable/misconfigure seccomp, apparmor/selinux, capabilities
• Change the default memory limits, CPU shares (else DOS)
• Do not use default docker0 bridge (ARP spoofing, MITM etc.)
• Enable PIDs cgroup per container (fork bomb)
• Do not use privileged containers and try to set no new privileges flag (priv. issues)
• Beware of non namespaced components : kernel keyring etc. (Container breakout)
• Bind incoming traffic to any specific interface (Info disclosure etc.)
• Do not share host’s namespaces to containers (Info disclosure etc.)
• Mounts (Violation of least privilege)
• Ensure Docker commands get latest images (Caching issue)
18
Client <=> daemon
communication
Communication with public/private registry
Registry’s security
Host security Daemon security
Containers Images
Container Pipeline, Risk Areas and our Scope
Ref: Modified version of image on www.docker.com
19
Other components - Golden Rules
• Daemon Security
- Fix dangerous defaults such as allowing communication between containers
- Enable/use/implement much needed security controls (user namespaces,
ulimits, authorization plugins, restricting daemon access)
• Communication Security
• Registry’s Security (Did not explore specifically)
• Host Security
- Maintain latest Linux kernel (PIDs cgroup only in > 4.3) and Docker version
- Apply kernel hardening policies (GRSecurity, PaX etc.)
- Harden the host as per CIS / SANS / your custom hardening guidelines
20
Enterprise zone (Personal users ALLOWED!)
• Images
- Say “no” to Docker Hub (definitely not general images)
- Maintain your own in-house registries (What security controls?)
- Base image selection and also using image optimization techniques
• Runtime
- Customize seccomp, apparmor/selinux etc. profiles
• Misc.
- Create container specific standards and guidelines
- Use commercial tools (useful features like Image Lockdown, RBAC, profiling,
monitoring, anomaly detection, secret management etc.)
- Customize CIS Docker benchmarks as per your requirements and adhere to it
- Use file monitoring solutions
- Container specific SIEM rules
- Group containers on VM’s (categories?)
- Your general security controls 
21
Client <=> daemon
communication
Communication with public/private registry
Registry’s security
Host security Daemon security
Containers Images
Container Pipeline, Risk Areas and our Scope
Ref: Modified version of image on www.docker.com
22
 A.B.C.D….
• Containers in 45 seconds
• Container Pipeline, Risk Areas and our Scope
 Security
• Images
• Runtime
• Other components
• Enterprise zone
 Misc.
 Wrap up
What’s next?
23
Misc.
• Tool recommendations (Meet me!)
- Images
- Network level
- Container Ecosystem
• Hardware isolation to containers (Clear containers – are they really containers?)
• Future expectation of containers (My 2¢)
• Virtual machines security to containers (view of kernel)
24
What’s next?
 A.B.C.D….
• Containers in 45 seconds
• Container Pipeline, Risk Areas and our Scope
 Security
• Images
• Runtime
• Other components
• Enterprise zone
 Misc.
 Wrap up
25
So, what did you learn today?
26
It’s not good to keep questions in your mind
Throw them out and I am here to catch 
27
References
1. CIS Docker Benchmarks - 1.12 and 1.13
2. https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/april/ncc_group_understanding_hardening_linux_containers-1-1pdf
3. www.oreilly.com/webops-perf/free/files/docker-security.pdf
4. http://container-solutions.com/content/uploads/2015/06/15.06.15_DockerCheatSheet_A2.pdf
5. http://www.slideshare.net/Docker/docker-security-workshop-slides
6. http://www.slideshare.net/Docker/securing-the-container-pipeline-at-salesforce-by-cem-gurkok-63493231
7. https://docs.docker.com/engine/security/
8. http://www.slideshare.net/Docker/docker-security-deep-dive-by-ying-li-and-david-lawrence
28TCS Confidential
That’s it…!
You can collect my V-Card
Reach me on www.manideepk.com for any questions

More Related Content

PDF
Breaking and fixing_your_dockerized_environments_owasp_appsec_usa2016
PDF
Is Docker Secure?
PDF
BSides SF talk on Docker Images Security - Feb 13, 2017
PPT
Container security
PDF
RSA conference poster on Docker container security
PDF
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
 
PPTX
An In-depth look at application containers
PDF
Practical Approaches to Container Security
Breaking and fixing_your_dockerized_environments_owasp_appsec_usa2016
Is Docker Secure?
BSides SF talk on Docker Images Security - Feb 13, 2017
Container security
RSA conference poster on Docker container security
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
 
An In-depth look at application containers
Practical Approaches to Container Security

What's hot (20)

PDF
Security of Linux containers in the cloud
PDF
Testing Docker Images Security -All day dev ops 2017
PDF
Testing Docker Images Security
PDF
Docker Containers Security
PPT
Securing the Cloud
PPTX
A (fun!) Comparison of Docker Vulnerability Scanners
PDF
Dockers & kubernetes detailed - Beginners to Geek
PPTX
V brownbag sept-14-2016
PPTX
"Docker best practice", Станислав Коленкин (senior devops, DataArt)
PDF
Docker Enterprise Deployment Planning
PDF
Docker en kernel security
PDF
5 Ways to Secure Your Containers for Docker and Beyond
PDF
Deploy microservices in containers with Docker and friends - KCDC2015
PDF
PIC your malware
PPTX
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
PDF
Containers, docker, and security: state of the union (Bay Area Infracoders Me...
PDF
Immutable Infrastructure Security
PDF
Docker 101
PDF
OSDC 2016 - Inspecting Security of Docker formatted Container Images to find ...
PPTX
Advanced Blockchain Technologies on Privacy and Scalability
Security of Linux containers in the cloud
Testing Docker Images Security -All day dev ops 2017
Testing Docker Images Security
Docker Containers Security
Securing the Cloud
A (fun!) Comparison of Docker Vulnerability Scanners
Dockers & kubernetes detailed - Beginners to Geek
V brownbag sept-14-2016
"Docker best practice", Станислав Коленкин (senior devops, DataArt)
Docker Enterprise Deployment Planning
Docker en kernel security
5 Ways to Secure Your Containers for Docker and Beyond
Deploy microservices in containers with Docker and friends - KCDC2015
PIC your malware
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
Containers, docker, and security: state of the union (Bay Area Infracoders Me...
Immutable Infrastructure Security
Docker 101
OSDC 2016 - Inspecting Security of Docker formatted Container Images to find ...
Advanced Blockchain Technologies on Privacy and Scalability
Ad

Viewers also liked (16)

PDF
Introduction to containers running dockers using kubernetes - הרצאה לכנס מיק...
PDF
Behavioural activity monitoring on CoreOS with Sysdig Falco
PPTX
Dockerfile at Guidewire
PDF
'The History of Metrics According to me' by Stephen Day
PDF
Infinit: Modern Storage Platform for Container Environments
PDF
Container World 2017!
PDF
Online Meetup: What's new in docker 1.13.0
PPTX
Containerd - core container runtime component
PPTX
Docker Security workshop slides
PDF
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker images
PDF
containerd summit - Deep Dive into containerd
PPTX
Docker 101 - Nov 2016
PDF
containerd and CRI
PDF
Driving containerd operations with gRPC
PPTX
Docker Online Meetup: Announcing Docker CE + EE
PPTX
Security best practices for kubernetes deployment
Introduction to containers running dockers using kubernetes - הרצאה לכנס מיק...
Behavioural activity monitoring on CoreOS with Sysdig Falco
Dockerfile at Guidewire
'The History of Metrics According to me' by Stephen Day
Infinit: Modern Storage Platform for Container Environments
Container World 2017!
Online Meetup: What's new in docker 1.13.0
Containerd - core container runtime component
Docker Security workshop slides
RootedCON 2017 - Docker might not be your friend. Trojanizing Docker images
containerd summit - Deep Dive into containerd
Docker 101 - Nov 2016
containerd and CRI
Driving containerd operations with gRPC
Docker Online Meetup: Announcing Docker CE + EE
Security best practices for kubernetes deployment
Ad

Similar to How secure is your Docker Container pipeline? (20)

PDF
Finding Your Way in Container Security
PDF
Finding Your Way in Container Security
PPTX
Containers and Security for DevOps
PDF
Container Security
PDF
Containers and security
PPTX
Securing the Infrastructure and the Workloads of Linux Containers
PPTX
Understanding container security
PDF
Securing the Container Pipeline
PPTX
Lessons Learned Running Hadoop and Spark in Docker Containers
PDF
DCSF19 Container Security: Theory & Practice at Netflix
PDF
SecDevOps containers
PDF
stackconf 2020 | SecDevOps containers by Jose Ortega
PDF
Securing the Container Pipeline at Salesforce by Cem Gurkok
PDF
Container Security: How We Got Here and Where We're Going
PDF
Docker Security and Content Trust
PDF
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
PDF
Docker container security
PDF
Everything you need to know about containers security
PDF
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
PPTX
Docker Security
Finding Your Way in Container Security
Finding Your Way in Container Security
Containers and Security for DevOps
Container Security
Containers and security
Securing the Infrastructure and the Workloads of Linux Containers
Understanding container security
Securing the Container Pipeline
Lessons Learned Running Hadoop and Spark in Docker Containers
DCSF19 Container Security: Theory & Practice at Netflix
SecDevOps containers
stackconf 2020 | SecDevOps containers by Jose Ortega
Securing the Container Pipeline at Salesforce by Cem Gurkok
Container Security: How We Got Here and Where We're Going
Docker Security and Content Trust
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Docker container security
Everything you need to know about containers security
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Docker Security

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Cloud computing and distributed systems.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Empathic Computing: Creating Shared Understanding
PPT
Teaching material agriculture food technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Machine learning based COVID-19 study performance prediction
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A Presentation on Artificial Intelligence
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
Cloud computing and distributed systems.
The AUB Centre for AI in Media Proposal.docx
Empathic Computing: Creating Shared Understanding
Teaching material agriculture food technology
Programs and apps: productivity, graphics, security and other tools
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Building Integrated photovoltaic BIPV_UPV.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

How secure is your Docker Container pipeline?

  • 1. How secure is your container pipeline? Manideep Konakandla www.manideepk.com (@manideep_k1) Feb 22, 2017
  • 2. 2 Who am I? Hmm, yeah - Shameless Bragging • J.N Tata Scholar, ISC2 Scholar, RSA Conference Security Scholar etc. • Masters Student (Graduating in May’17) + Security Researcher at CMU • Authored a book on Info Sec & Ethical Hacking at the age of 21 • Featured in INDIA’s largest news papers and news channels • 10 certifications + Trained 15,000+ people in Information Security • Ex “Team Lead – Core Security & Data Analytics” at TCS • Interest areas : Container Security, Application Security, System Security etc. More details about me on www.manideepk.com
  • 3. 3 What am I up to with Containers? • Co-author, Contributor for CIS Docker 1.12 & 1.13 benchmarks • Extensive research at Carnegie Mellon (CMU) • Presented findings at OWASP AppsecUSA, Bsides SF, RSA (Poster), Grehack etc. • Cloud Security Research Intern @Adobe last Summer
  • 4. 4 Security skills can be taught but Security mindset comes only with passion
  • 6. 6 What are we doing for next 40 mins?  A.B.C.D…. • Containers in 45 seconds • Container Pipeline, Risk Areas and our Scope  Security • Images • Runtime • Other components • Enterprise zone  Misc.  Wrap up
  • 7. 7 What are we doing for next 40 mins?  A.B.C.D…. • Containers in 45 seconds • Container Pipeline, Risk Areas and our Scope  Security • Images • Runtime • Other components • Enterprise zone  Misc.  Wrap up
  • 8. 8 Quick “60 second” Intro Containers?  Lightweight  Application centric  No more - “it works on my machine”  Micro-services Namespaces : Isolation (PID, User, Network, IPC, Mount, UTS) Cgroups : Isolates, limits and accounts resource usage (CPU, memory etc.) BUZZ……….! Are containers brand new? Img Ref: www.docker.com Containers in 45 seconds
  • 9. 9 Client <=> daemon communication Communication with public/private registry Registry’s security Host security Daemon security Containers Images Container Pipeline, Risk Areas and our Scope Ref: Modified version of image on www.docker.com
  • 10. 10 What’s next?  A.B.C.D…. • Containers in 45 seconds • Container Pipeline, Risk Areas and our Scope  Security • Images • Runtime • Other components • Enterprise zone  Misc.  Wrap up
  • 11. 11 Client <=> daemon communication Communication with public/private registry Registry’s security Host security Daemon security Containers Images Container Pipeline, Risk Areas and our Scope Ref: Modified version of image on www.docker.com
  • 12. 12 Life cycle of an “Image” Build Spin Dockerfile Image Container Maintaining images
  • 13. 13 Security in “Dockerfile” - Golden Rules • Do not write secrets in Dockerfile (Info Disclosure - Twitter’s Vine). Use secret management solutions • Create a USER or else container will run as a root (Privilege escalation) • Follow version pinning for images, packages (no ‘latest’) etc. (Caching Issue) • Remove unnecessary setuid, setgid permissions (Privilege escalation) • Download packages securely using GPG (MITM) and also do not download unnecessary packages (Increased attack surface) • Do not write any kind of update instructions alone in the Dockerfile (Caching) • Use COPY instead of ADD (Increased attack surface) • Use HEALTHCHECK command (Best practice) • Use gosu instead of sudo wherever possible • Try to restrict a image (/container) to one service
  • 15. 15 Maintaining/ Consuming Images - Golden Rules • Docker Content Trust - Provides authenticity, integrity and freshness guarantees - Takes some time to understand & prepare your own setup (worth it!) • Vulnerability–free Images - Tool selection : binary level analysis + hash based • Except compatibility issues, all images and packages must be up-to-date
  • 16. 16 Client <=> daemon communication Communication with public/private registry Registry’s security Host security Daemon security Containers Images Container Pipeline, Risk Areas and our Scope Ref: Modified version of image on www.docker.com
  • 17. 17 Container Runtime - Golden Rules • Do not disable/misconfigure seccomp, apparmor/selinux, capabilities • Change the default memory limits, CPU shares (else DOS) • Do not use default docker0 bridge (ARP spoofing, MITM etc.) • Enable PIDs cgroup per container (fork bomb) • Do not use privileged containers and try to set no new privileges flag (priv. issues) • Beware of non namespaced components : kernel keyring etc. (Container breakout) • Bind incoming traffic to any specific interface (Info disclosure etc.) • Do not share host’s namespaces to containers (Info disclosure etc.) • Mounts (Violation of least privilege) • Ensure Docker commands get latest images (Caching issue)
  • 18. 18 Client <=> daemon communication Communication with public/private registry Registry’s security Host security Daemon security Containers Images Container Pipeline, Risk Areas and our Scope Ref: Modified version of image on www.docker.com
  • 19. 19 Other components - Golden Rules • Daemon Security - Fix dangerous defaults such as allowing communication between containers - Enable/use/implement much needed security controls (user namespaces, ulimits, authorization plugins, restricting daemon access) • Communication Security • Registry’s Security (Did not explore specifically) • Host Security - Maintain latest Linux kernel (PIDs cgroup only in > 4.3) and Docker version - Apply kernel hardening policies (GRSecurity, PaX etc.) - Harden the host as per CIS / SANS / your custom hardening guidelines
  • 20. 20 Enterprise zone (Personal users ALLOWED!) • Images - Say “no” to Docker Hub (definitely not general images) - Maintain your own in-house registries (What security controls?) - Base image selection and also using image optimization techniques • Runtime - Customize seccomp, apparmor/selinux etc. profiles • Misc. - Create container specific standards and guidelines - Use commercial tools (useful features like Image Lockdown, RBAC, profiling, monitoring, anomaly detection, secret management etc.) - Customize CIS Docker benchmarks as per your requirements and adhere to it - Use file monitoring solutions - Container specific SIEM rules - Group containers on VM’s (categories?) - Your general security controls 
  • 21. 21 Client <=> daemon communication Communication with public/private registry Registry’s security Host security Daemon security Containers Images Container Pipeline, Risk Areas and our Scope Ref: Modified version of image on www.docker.com
  • 22. 22  A.B.C.D…. • Containers in 45 seconds • Container Pipeline, Risk Areas and our Scope  Security • Images • Runtime • Other components • Enterprise zone  Misc.  Wrap up What’s next?
  • 23. 23 Misc. • Tool recommendations (Meet me!) - Images - Network level - Container Ecosystem • Hardware isolation to containers (Clear containers – are they really containers?) • Future expectation of containers (My 2¢) • Virtual machines security to containers (view of kernel)
  • 24. 24 What’s next?  A.B.C.D…. • Containers in 45 seconds • Container Pipeline, Risk Areas and our Scope  Security • Images • Runtime • Other components • Enterprise zone  Misc.  Wrap up
  • 25. 25 So, what did you learn today?
  • 26. 26 It’s not good to keep questions in your mind Throw them out and I am here to catch 
  • 27. 27 References 1. CIS Docker Benchmarks - 1.12 and 1.13 2. https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/april/ncc_group_understanding_hardening_linux_containers-1-1pdf 3. www.oreilly.com/webops-perf/free/files/docker-security.pdf 4. http://container-solutions.com/content/uploads/2015/06/15.06.15_DockerCheatSheet_A2.pdf 5. http://www.slideshare.net/Docker/docker-security-workshop-slides 6. http://www.slideshare.net/Docker/securing-the-container-pipeline-at-salesforce-by-cem-gurkok-63493231 7. https://docs.docker.com/engine/security/ 8. http://www.slideshare.net/Docker/docker-security-deep-dive-by-ying-li-and-david-lawrence
  • 28. 28TCS Confidential That’s it…! You can collect my V-Card Reach me on www.manideepk.com for any questions