TY - GEN
T1 - Understanding security implications of using containers in the cloud
AU - Tak, Byungchul
AU - Isci, Canturk
AU - Duri, Sastry
AU - Bila, Nilton
AU - Nadgowda, Shripad
AU - Doran, James
N1 - Publisher Copyright:
© USENIX Annual Technical Conference, USENIX ATC 2017. All rights reserved.
PY - 2019
Y1 - 2019
N2 - Container technology is being adopted as a mainstream platform for IT solutions because of high degree of agility, reusability and portability it offers. However, there are challenges to be addressed for successful adoption. First, it is difficult to establish the full pedigree of images downloaded from public registries. Some might have vulnerabilities introduced unintentionally through rounds of updates by different users. Second, non-conformance to the immutable software deployment policies, such as those promoted by the DevOps principles, introduces vulnerabilities and the loss of control over deployed software. In this study, we investigate containers deployed in a production cloud to derive a set of recommended approaches to address these challenges. Our analysis reveals evidences that (i), images of unresolved pedigree have introduced vulnerabilities to containers belonging to third parties; (ii), updates to live public containers are common, defying the tenet that deployed software is immutable; and (iii), scanning containers or images alone is insufficient to eradicate vulnerabilities from public containers. We advocate for better systems support for tracking image provenance and resolving disruptive changes to containers, and propose practices that container users should adopt to limit the vulnerability of their containers.
AB - Container technology is being adopted as a mainstream platform for IT solutions because of high degree of agility, reusability and portability it offers. However, there are challenges to be addressed for successful adoption. First, it is difficult to establish the full pedigree of images downloaded from public registries. Some might have vulnerabilities introduced unintentionally through rounds of updates by different users. Second, non-conformance to the immutable software deployment policies, such as those promoted by the DevOps principles, introduces vulnerabilities and the loss of control over deployed software. In this study, we investigate containers deployed in a production cloud to derive a set of recommended approaches to address these challenges. Our analysis reveals evidences that (i), images of unresolved pedigree have introduced vulnerabilities to containers belonging to third parties; (ii), updates to live public containers are common, defying the tenet that deployed software is immutable; and (iii), scanning containers or images alone is insufficient to eradicate vulnerabilities from public containers. We advocate for better systems support for tracking image provenance and resolving disruptive changes to containers, and propose practices that container users should adopt to limit the vulnerability of their containers.
UR - http://www.scopus.com/inward/record.url?scp=85077447449&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85077447449
T3 - Proceedings of the 2017 USENIX Annual Technical Conference, USENIX ATC 2017
SP - 313
EP - 319
BT - Proceedings of the 2017 USENIX Annual Technical Conference, USENIX ATC 2017
PB - USENIX Association
T2 - 2017 USENIX Annual Technical Conference, USENIX ATC 2017
Y2 - 12 July 2017 through 14 July 2017
ER -