2018 NSFOCUS Technical Report on Container Security NSFOCUS Star Cloud Laboratory
Total Page:16
File Type:pdf, Size:1020Kb
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 2018 NSFOCUS Technical Report on Container Security NSFOCUS Star Cloud Laboratory © 2018 NSFOCUS About NSFOCUS NSFOCUS is an iconic internet and application security company with over 18 years of proven industry experience. Today, we are operating globally with 2000+ employees at two headquarters in Beijing, China and 40+ offices worldwide including the IBD HQ in Santa Clara, CA, USA. NSFOCUS protects four of the ten largest global telecommunications companies and four of the five largest global financial institutions. With its multi-tenant and distributed cloud security platform, NSFOCUS effectively moves security into the internet backbone by: operating in data centers around the world, enabling organizations to fully leverage the promise of cloud computing, providing unparalleled and uncompromising protection and performance, and empowering our partners to provide better security as a service in a smart and simple way. NSFOCUS delivers holistic, carrier-grade, hybrid DDoS and web security powered by industry leading threat intelligence. About NeuVector NeuVector is the first company to develop Docker/Kubernetes security products. It is the leader in container network security and delivers the first and only multivector container security platform. NeuVector has committed to guaranteeing the security of enterprise-level container platforms, with its products applicable to cloud, multi-cloud, and on-premises container production environments. NeuVector provides in-depth runtime visibility into the container network, monitors "east-west" container traffic, performs proactive isolation and protection, and ensures the security of hosts and within containers. Through seamless integration with container management platforms, it achieves automation of application-level container security. NeuVector customers include global leaders in financial services, healthcare, publishing, and emerging Internet enterprises, and NeuVector partners with AWS, Docker, Google, IBM, Rancher, Red Hat, Aliyun and others. Founded by industry veterans from Fortinet, VMware, Trend Micro, Symantec, and Juniper, NeuVector has developed patent-pending behavioral learning, network security, data security, and container security. 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 2018 NSFOCUS Technical Report on Container Security 2018 NSFOCUS Technical Report on Container Security NSFOCUS Star Cloud Laboratory October 2018 CONTAINER SECURITY 2018 NSFOCUS Technical Report on Container Security Catalogue Preface ··················································································································1 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 1. Overview ············································································································2 1.1 Container and Virtualization ·························································································· 3 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101.2 Evolutionary2018 History of Containerization ····································································· 4 1010101010101 1.3 Container Security ··········································································································NSFOCUS 5 Technical Report 2. Container Basics ·······························································································8 on Container2018 Security 2.1 Container Image ·············································································································NSFOCUS 9 2.1.1 What Is a Container Image? ································································································· 9 2.1.2 Characteristics of a ContainerTechnical Image ················································································· Report 9 2.1.3 Image Building ······················································································································on Container Security 10 2.1.4 Image Repository ················································································································· 11 2.1.5 Use of Images·······················································································································13 2.2 Container Storage ·········································································································14 2.2.1 Image Metadata ···················································································································14 2.2.2 Storage Driver ·······················································································································14 2.2.3 Data Volume ·························································································································15 2.3 Container Networking ··································································································16 2.3.1 Underlying Technologies of Container Networking ························································ 16 2.3.2 Host Networking ·················································································································· 18 2.3.3 Cluster Networking ·············································································································· 19 2.4 Container Management and Application ··································································23 2.4.1 Container Management ······································································································ 23 2.4.2 Container Usage Scenarios ································································································ 30 3. Vulnerability and Security Risk Analysis ·······················································35 3.1 Vulnerability and Security Risk Analysis ····································································36 3.1.1 Software Risks ······················································································································36 3.1.2 API Security ···························································································································39 3.1.3 Insecure Images ···················································································································43 3.1.4 Container Isolation Losing Effect ······················································································ 44 B 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 2018 NSFOCUS Technical Report on Container Security 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 2018 NSFOCUS Technical Report on Container Security 3.2 Security Threat Analysis ······························································································45 3.2.1 Container Escape Attack ····································································································· 45 3.2.2 Container Network Attack ··································································································· 45 3.2.3 Denial-of-Service (DoS) Attack ··························································································· 46 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 3.3 Container Application Security Threat ·······································································47 3.3.1 Microservice Security ·········································································································· 47 3.3.2 DevOps Security ··················································································································· 47 2018 4. Container Security Protection ········································································49 NSFOCUS 4.1 Linux Kernel Security Mechanism ··············································································50 Technical Report 4.1.1 Kernel Namespace ··············································································································· 50 on Container Security 4.1.2 Control Groups ·····················································································································50 4.1.3 Linux Kernel Capabilities ····································································································· 51 4.1.4 Other Kernel Security Features ·························································································· 51 4.2 Container Service Security ··························································································53 4.3 Host Security ·················································································································54 4.3.1 Hardening of Basic Host Security ······················································································ 54 4.3.2 Hardening of Container-related