Securing cloud configurations is an elusive task, which is left up to system administrators who have to base their decisions on ``trial and error'' experimentations or by observing good practices (e.g., CIS Benchmarks). We propose a knowledge, AND/OR, graphs approach to model cloud deployment security objects and vulnerabilities. In this way, we can capture relationships between configurations, permissions (e.g., CAP\_SYS\_ADMIN), and security profiles (e.g., AppArmor and SecComp), as first-class citizens. Such an approach allows us to suggest alternative and safer configurations, support administrators in the study of what-if scenarios, and scale the analysis to large scale deployments. We present an initial validation and illustrate the approach with three real vulnerabilities from known sources.
翻译:确保云层配置是一项难以捉摸的任务,应由系统管理员根据“审判和错误”的实验或观察良好做法(如独联体基准)作出决定。我们建议一种知识、和/或图表方法来模拟云层部署安全对象和脆弱性。这样,我们可以捕捉配置、许可(如CAP ⁇ SYS ⁇ ADMIN)和安全简介(如AppArmor和SecComp)之间以及作为一流公民的安全简介(如AppArmor和SecCom)之间的关系。这样一种方法使我们能够提出替代的、更安全的配置,支持管理员研究哪些情景,并将分析扩大到大规模部署。我们提出初步的验证,并用已知来源的三个真实的脆弱性来说明这一方法。