학술논문

Stay at the Helm: secure Kubernetes deployments via graph generation and attack reconstruction
Document Type
Conference
Source
2022 IEEE 15th International Conference on Cloud Computing (CLOUD) CLOUD Cloud Computing (CLOUD), 2022 IEEE 15th International Conference on. :59-69 Jul, 2022
Subject
Computing and Processing
Industries
Cloud computing
Microservice architectures
Feature extraction
Market research
Explosions
Security
Microservices
cloud computing
containerisation
orchestration
Kubernetes
Helm Charts
Language
ISSN
2159-6190
Abstract
In recent years, there has been an explosion of attacks directed at microservice-based platforms – a trend that follows closely the massive shift of the digital industries towards these environments. Management and operation of container-based microservices is automation-heavy, leveraging on container orchestration engines such as Kubernetes (K8s). Helm is the package manager of choice for K8s and provides Charts, i.e., configuration files that define a programmatic model for application deployments. In this paper, we propose a novel methodology for extracting and evaluating the security model of Helm Charts. Our proposal extracts a topological graph of the Chart, whose nodes and edges are then characterised by security features. We carry out risk assessments that refer to the attack tactics of the MITRE ATT&CK framework. Furthermore, starting from these scores, we extract the riskiest attack paths. We adopt an experimental validation approach by analysing a dataset created from multiple publicly accessible Helm Chart repositories. Our methodology reveals that, in most cases, they have vulnerabilities that can be exploited through complex attack paths.