Hardware-Enforced Integrity and Provenance for Distributed Code Deployments

06/17/2021
by   Marcela S. Melara, et al.
0

Deployed microservices must adhere to a multitude of application-level security requirements and regulatory constraints imposed by mutually distrusting application principals–software developers, cloud providers, and even data owners. Although these principals wish to enforce their individual security requirements, they do not currently have a common way of easily identifying, expressing and automatically enforcing these requirements at deployment time. CDI (Code Deployment Integrity) is a security policy framework that enables distributed application principals to establish trust in deployed code through high-integrity provenance information. We observe that principals expect the software supply chain to preserve certain code security properties throughout the creation of an executable bundle, even if the code is transformed or inspected through various tools (e.g., compilation inserts stack canaries for memory safety). Our key insight in designing CDI is that even if application principals do not trust each other directly, they can trust a microservice bundle to meet their security policies if they can trust the tools involved in creating the bundle.

READ FULL TEXT

page 1

page 2

page 3

research
06/17/2021

Enabling Security-Oriented Orchestration of Microservices

As cloud providers push multi-tenancy to new levels to meet growing scal...
research
09/09/2019

Análise de Segurança Baseada em Roles para Fábricas de Software

Most software factories contain applications with sensitive information ...
research
11/26/2021

Towards a Secure and Reliable IT-Ecosystem in Seaports

Digitalization in seaports dovetails the IT infrastructure of various ac...
research
08/05/2023

DiSPEL: Distributed Security Policy Enforcement for Bus-based SoC

The current zero trust model adopted in System-on-Chip (SoC) design is v...
research
05/05/2021

Trusted Enforcement of Application-specific Security Policies

While there have been approaches for integrating security policies into ...
research
09/15/2018

On the Integrity of Cross-Origin JavaScripts

The same-origin policy is a fundamental part of the Web. Despite the res...
research
01/16/2019

Secure Cloud-Edge Deployments, with Trust

Assessing the security level of IoT applications to be deployed to heter...

Please sign up or login with your details

Forgot password? Click here to reset