Enabling Security-Oriented Orchestration of Microservices

06/17/2021
by   Marcela S. Melara, et al.
0

As cloud providers push multi-tenancy to new levels to meet growing scalability demands, ensuring that externally developed untrusted microservices will preserve tenant isolation has become a high priority. Developers, in turn, lack a means for expressing and automatically enforcing high-level application security requirements at deployment time. In this paper, we observe that orchestration systems are ideally situated between developers and the cloud provider to address these issues. We propose a security policy framework that enables security-oriented orchestration of microservices by capturing and auditing code properties that are incorporated into microservice code throughout the software supply chain. Orchestrators can leverage these properties to deploy microservices on a node that matches both the developer's and cloud provider's security policy and their resource requirements. We demonstrate our approach with a proof-of-concept based on the Private Data Objects [1] confidential smart contract framework, deploying code only after checking its provenance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/17/2021

Hardware-Enforced Integrity and Provenance for Distributed Code Deployments

Deployed microservices must adhere to a multitude of application-level s...
research
01/13/2020

Formal specification of a security framework for smart contracts

As smart contracts are growing in size and complexity, it becomes harder...
research
09/09/2019

Análise de Segurança Baseada em Roles para Fábricas de Software

Most software factories contain applications with sensitive information ...
research
09/08/2022

What is Software Supply Chain Security?

The software supply chain involves a multitude of tools and processes th...
research
05/04/2018

SecureStreams: A Reactive Middleware Framework for Secure Data Stream Processing

The growing adoption of distributed data processing frameworks in a wide...
research
09/01/2022

Towards Assessing Isolation Properties in Partitioning Hypervisors

Partitioning hypervisor solutions are becoming increasingly popular, to ...
research
06/18/2021

Risk-Oriented Design Approach For Forensic-Ready Software Systems

Digital forensic investigation is a complex and time-consuming activity ...

Please sign up or login with your details

Forgot password? Click here to reset