Agile Network Access Control in the Container Age

03/02/2019
by   Cornelius Diekmann, et al.
0

Linux Containers, such as those managed by Docker, are an increasingly popular way to package and deploy complex applications. However, the fundamental security primitive of network access control for a distributed microservice deployment is often ignored or left to the network operations team. High-level application-specific security requirements are not appropriately enforced by low-level network access control lists. Apart from coarse-grained separation of virtual networks, Docker neither supports the application developer to specify nor the network operators to enforce fine-grained network access control between containers. In a fictional story, we follow DevOp engineer Alice through the lifecycle of a web application. From the initial design and software engineering through network operations and automation, we show the task expected of Alice and propose tool-support to help. As a full-stack DevOp, Alice is involved in high-level design decisions as well as low-level network troubleshooting. Focusing on network access control, we demonstrate shortcomings in today's policy management and sketch a tool-supported solution. We survey related academic work and show that many existing tools fail to bridge between the different levels of abstractions a full-stack engineer is operating on. Our toolset is formally verified using Isabell/HOL and is available as Open Source.

READ FULL TEXT
research
02/26/2019

NAC: Automating Access Control via Named Data

In this paper we present the design of Name-based Access Control (NAC) s...
research
07/06/2018

OSDF: An Intent-based Software Defined Network Programming Framework

Software Defined Networking (SDN) offers flexibility to program a networ...
research
01/07/2020

A fine-grained policy model for Provenance-based Access Control and Policy Algebras.pdf

A fine-grained provenance-based access control policy model is proposed ...
research
01/21/2019

Virtually the Same: Comparing Physical and Virtual Testbeds

Network designers, planners, and security professionals increasingly rel...
research
05/29/2020

DEMO: Attaching InternalBlue to the Proprietary macOS IOBluetooth Framework

In this demo, we provide an overview of the macOS Bluetooth stack intern...
research
05/18/2023

ProgSG: Cross-Modality Representation Learning for Programs in Electronic Design Automation

Recent years have witnessed the growing popularity of domain-specific ac...
research
06/16/2022

The Case for a Wholistic Serverless Programming Paradigm and Full Stack Automation for AI and Beyond – The Philosophy of Jaseci and Jac

In this work, the case is made for a wholistic top-down re-envisioning o...

Please sign up or login with your details

Forgot password? Click here to reset