Code Monkey home page Code Monkey logo

the-container-security-book's Issues

Security with Immutability - containers with seccomp-bpf

This chapter or a section within the relevant chapter will cover the concept of container immutability. It will also dive into how immutability can be implemented using the tools available like seccomp-bpf and capabilities.

Threat Models in Ch1

One concept that might be worth introducing in Chapter one is threat models, as a means of helping organizations prioritize their security controls.

So things like the threat model of a hard multi-tenancy Kubernetes cluster is quite different to one that has very few users and runs more trusted applications. Ultimately companies have limited resources, so threat modelling can be quite useful in helping them pick which controls to start with.

A simplified model that I tend to use for container security engagements is

  1. External attackers. Pretty much everyone has to worry about them, and most of the controls that are important are around preventing unauthenticated attackers gaining access they shouldn't (so things like dashboard security, kubelet authentication etc)

  2. Compromised containers. Where an attacker has already gained unauthorised access to a single container, controls move more to the container network and also include escalation to the node.

  3. Malicious Users. If a container orchestration system has to worry about potentially malicious users (e.g in a hard multi-tenancy setup) then things like RBAC and PSP (in Kubernetes land) become much more important.

Container networking

I noticed we don't have a section on networking within the book. I can do a section or few on container networking, especially between nodes for orchestrators.

Capabilities in Ch3

One thing that would likely fit well in Chapter 3 is some coverage of capabilities, as they're important to constraining privileged users inside containers, and aren't always well understood.

There's quite a few good resources on capabilities that could be used for research / source material, here's some I've found useful

and a blog post I wrote a while back on the topic.

Protective controls on host when runtime is vulnerable/exposed

This may link to issue #2 - having an understanding of protective controls on host would help with isolation and mitigation techniques.

Perhaps this is a chapter dedicated to VMMs and isolation enforced through seccomp, chroot and other sandboxing controls using projects like firecracker, gVisor, Kata containers and others.

The "current version" link on https://container-security.guide links to a non-existent S3 key

First, thanks for publishing this and making it available. I think the title pretty much says it all, but here's the error message in case it's helpful

<Error>
<Code>NoSuchKey</Code>
<Message>The specified key does not exist.</Message>
<Key>container-security-preview.pdf</Key>
<RequestId>2H5V5K3ZBMCW4PBT</RequestId>
...
</Error>

I realize this repo's not terribly active; I'll get the content from the markdown files, but it would be lovely to be able to get it in PDF.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.