Code Monkey home page Code Monkey logo

the-container-security-book's Introduction

The Container Security Book (TCSB)

A book on container security, published via Leanpub and available via CC BY 4.0 for everyone to read and re-use freely, as in both ice cream and freedom. If you plan to sponsor it, all the moneyz goes to charities.

The TCSB authors.

the-container-security-book's People

Contributors

mhausenblas avatar paavan98pm avatar raesene avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

the-container-security-book's Issues

The "current version" link on https://container-security.guide links to a non-existent S3 key

First, thanks for publishing this and making it available. I think the title pretty much says it all, but here's the error message in case it's helpful

<Error>
<Code>NoSuchKey</Code>
<Message>The specified key does not exist.</Message>
<Key>container-security-preview.pdf</Key>
<RequestId>2H5V5K3ZBMCW4PBT</RequestId>
...
</Error>

I realize this repo's not terribly active; I'll get the content from the markdown files, but it would be lovely to be able to get it in PDF.

Security with Immutability - containers with seccomp-bpf

This chapter or a section within the relevant chapter will cover the concept of container immutability. It will also dive into how immutability can be implemented using the tools available like seccomp-bpf and capabilities.

Capabilities in Ch3

One thing that would likely fit well in Chapter 3 is some coverage of capabilities, as they're important to constraining privileged users inside containers, and aren't always well understood.

There's quite a few good resources on capabilities that could be used for research / source material, here's some I've found useful

and a blog post I wrote a while back on the topic.

Container networking

I noticed we don't have a section on networking within the book. I can do a section or few on container networking, especially between nodes for orchestrators.

Threat Models in Ch1

One concept that might be worth introducing in Chapter one is threat models, as a means of helping organizations prioritize their security controls.

So things like the threat model of a hard multi-tenancy Kubernetes cluster is quite different to one that has very few users and runs more trusted applications. Ultimately companies have limited resources, so threat modelling can be quite useful in helping them pick which controls to start with.

A simplified model that I tend to use for container security engagements is

  1. External attackers. Pretty much everyone has to worry about them, and most of the controls that are important are around preventing unauthenticated attackers gaining access they shouldn't (so things like dashboard security, kubelet authentication etc)

  2. Compromised containers. Where an attacker has already gained unauthorised access to a single container, controls move more to the container network and also include escalation to the node.

  3. Malicious Users. If a container orchestration system has to worry about potentially malicious users (e.g in a hard multi-tenancy setup) then things like RBAC and PSP (in Kubernetes land) become much more important.

Protective controls on host when runtime is vulnerable/exposed

This may link to issue #2 - having an understanding of protective controls on host would help with isolation and mitigation techniques.

Perhaps this is a chapter dedicated to VMMs and isolation enforced through seccomp, chroot and other sandboxing controls using projects like firecracker, gVisor, Kata containers and others.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.