Towards a Security Stress-Test for Cloud Configurations

05/28/2022
by   Francesco Minna, et al.
0

Securing cloud configurations is an elusive task, which is left up to system administrators who have to base their decisions on “trial and error” experimentations or by observing good practices (e.g., CIS Benchmarks). We propose a knowledge, AND/OR, graphs approach to model cloud deployment security objects and vulnerabilities. In this way, we can capture relationships between configurations, permissions (e.g., CAP_SYS_ADMIN), and security profiles (e.g., AppArmor and SecComp), as first-class citizens. Such an approach allows us to suggest alternative and safer configurations, support administrators in the study of what-if scenarios, and scale the analysis to large scale deployments. We present an initial validation and illustrate the approach with three real vulnerabilities from known sources.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/22/2022

Vulnerability Prioritization: An Offensive Security Approach

Organizations struggle to handle sheer number of vulnerabilities in thei...
research
06/27/2020

XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices

Kubernetes is an open-source software for automating management of compu...
research
08/13/2023

Optimizing the cloud? Don't train models. Build oracles!

We propose cloud oracles, an alternative to machine learning for online ...
research
03/16/2020

Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities

Vyper has been proposed as a new high-level language for Ethereum smart ...
research
04/13/2018

Mitigating Docker Security Issues

It is very easy to run applications in Docker. Docker offers an ecosyste...
research
03/20/2023

A set of semantic data flow diagrams and its security analysis based on ontologies and knowledge graphs

For a long time threat modeling was treated as a manual, complicated pro...
research
01/17/2018

M-STAR: A Modular, Evidence-based Software Trustworthiness Framework

Despite years of intensive research in the field of software vulnerabili...

Please sign up or login with your details

Forgot password? Click here to reset