Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Access Security Policy Generation for Containers as a Cloud Service

Zhu, Hui LU ; Gehrmann, Christian LU and Roth, Paula (2023) In SN Computer Science 4(6).
Abstract

The rapid development of containerization technology comes with remarkable benefits for developers and operation teams. Container solutions allow building very flexible software infrastructures. Although lots of efforts have been devoted to enhancing containerization security, containerized environments still have a huge attack surface. Completely avoiding severe security issues have so far not been possible to achieve. However, the security problems due to vulnerabilities in for instance kernels, can be largely reduced if the container privileges are as restricted as possible. Mandatory access control is an efficient way to achieve this using for instance AppArmor. As manual AppArmor generation is tedious and error prone, automatic... (More)

The rapid development of containerization technology comes with remarkable benefits for developers and operation teams. Container solutions allow building very flexible software infrastructures. Although lots of efforts have been devoted to enhancing containerization security, containerized environments still have a huge attack surface. Completely avoiding severe security issues have so far not been possible to achieve. However, the security problems due to vulnerabilities in for instance kernels, can be largely reduced if the container privileges are as restricted as possible. Mandatory access control is an efficient way to achieve this using for instance AppArmor. As manual AppArmor generation is tedious and error prone, automatic generation of protection profile is necessary. In previous research, a new tool for tight AppArmor profile generation was presented. In this paper we show how, in a system setting, such tool can be combined with container service testing, to provide a cloud based container service for automatic AppArmore profile generation. We present solutions for profile generation both for centrally collected and generated container logs and for log collection through a local agent. To evaluate the effectiveness of the profile generation service, we enable it on a widely used containerized web service to generate profiles and test them with real-world attacks. We generate an exploit database with 11 exploits harmful to the tested web service. These exploits are sifted from the 56 exploits of Exploit-db targeting the tested web service’s software. We launch these exploits on the web service protected by the profile. The results show that the proposed profile generation service improves the test web service’s overall security a lot compared to using the default Docker security profile. This together with the very user friendly and robust principle for setting up and running the service, clearly indicates that the approach is an important step for improving container security in real deployments.

(Less)
Please use this url to cite or link to this publication:
author
; and
organization
publishing date
type
Contribution to journal
publication status
published
subject
keywords
AppArmor, Container, Docker, Security-as-a-service
in
SN Computer Science
volume
4
issue
6
article number
748
publisher
Springer Nature
external identifiers
  • scopus:85173921321
ISSN
2662-995X
DOI
10.1007/s42979-023-02186-1
language
English
LU publication?
yes
id
0ac121f7-be27-4fe9-8d46-fccb241f8fe6
date added to LUP
2023-12-08 14:46:21
date last changed
2024-02-09 10:57:48
@article{0ac121f7-be27-4fe9-8d46-fccb241f8fe6,
  abstract     = {{<p>The rapid development of containerization technology comes with remarkable benefits for developers and operation teams. Container solutions allow building very flexible software infrastructures. Although lots of efforts have been devoted to enhancing containerization security, containerized environments still have a huge attack surface. Completely avoiding severe security issues have so far not been possible to achieve. However, the security problems due to vulnerabilities in for instance kernels, can be largely reduced if the container privileges are as restricted as possible. Mandatory access control is an efficient way to achieve this using for instance AppArmor. As manual AppArmor generation is tedious and error prone, automatic generation of protection profile is necessary. In previous research, a new tool for tight AppArmor profile generation was presented. In this paper we show how, in a system setting, such tool can be combined with container service testing, to provide a cloud based container service for automatic AppArmore profile generation. We present solutions for profile generation both for centrally collected and generated container logs and for log collection through a local agent. To evaluate the effectiveness of the profile generation service, we enable it on a widely used containerized web service to generate profiles and test them with real-world attacks. We generate an exploit database with 11 exploits harmful to the tested web service. These exploits are sifted from the 56 exploits of Exploit-db targeting the tested web service’s software. We launch these exploits on the web service protected by the profile. The results show that the proposed profile generation service improves the test web service’s overall security a lot compared to using the default Docker security profile. This together with the very user friendly and robust principle for setting up and running the service, clearly indicates that the approach is an important step for improving container security in real deployments.</p>}},
  author       = {{Zhu, Hui and Gehrmann, Christian and Roth, Paula}},
  issn         = {{2662-995X}},
  keywords     = {{AppArmor; Container; Docker; Security-as-a-service}},
  language     = {{eng}},
  number       = {{6}},
  publisher    = {{Springer Nature}},
  series       = {{SN Computer Science}},
  title        = {{Access Security Policy Generation for Containers as a Cloud Service}},
  url          = {{http://dx.doi.org/10.1007/s42979-023-02186-1}},
  doi          = {{10.1007/s42979-023-02186-1}},
  volume       = {{4}},
  year         = {{2023}},
}