Stay at the Helm: secure Kubernetes deployments via graph generation and attack reconstruction - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2022

Stay at the Helm: secure Kubernetes deployments via graph generation and attack reconstruction

Résumé

In recent years, there has been an explosion of attacks directed at microservice-based platforms-a trend that follows closely the massive shift of the digital industries towards these environments. Management and operation of containerbased microservices is automation-heavy, leveraging on container orchestration engines such as Kubernetes (K8s). Helm is the package manager of choice for K8s and provides Charts, i.e., configuration files that define a programmatic model for application deployments. In this paper, we propose a novel methodology for extracting and evaluating the security model of Helm Charts. Our proposal extracts a topological graph of the Chart, whose nodes and edges are then characterised by security features. We carry out risk assessments that refer to the attack tactics of the MITRE ATT&CK framework. Furthermore, starting from these scores, we extract the riskiest attack paths. We adopt an experimental validation approach by analysing a dataset created from multiple publicly accessible Helm Chart repositories. Our methodology reveals that, in most cases, they have vulnerabilities that can be exploited through complex attack paths.
Fichier principal
Vignette du fichier
Reconstruction_model_Kubernetes.pdf (1.8 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03705672 , version 1 (27-06-2022)

Identifiants

  • HAL Id : hal-03705672 , version 1

Citer

Agathe Blaise, Filippo Rebecchi. Stay at the Helm: secure Kubernetes deployments via graph generation and attack reconstruction. IEEE International Conference On Cloud Computing, Jul 2022, Barcelona, Spain. ⟨hal-03705672⟩
115 Consultations
530 Téléchargements

Partager

Gmail Facebook X LinkedIn More