Securing Orchestrated Containers with BSI Module SYS.1.6

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Orchestrated container virtualization, such as Docker/Kubernetes, is an attractive option to transfer complex IT ecosystems into the cloud. However, this is associated with new challenges for IT security. A prominent option to secure IT infrastructures is to use security guidelines from agencies, such as Germany’s Federal Office for Information Security. In this work, we analyze the module ”SYS.1.6 Container” from this agency. We want to find out how suitable this module is to secure a typical Kubernetes scenario. Our scenario is a classical 3-tier architecture with front end, business logic and database-back end. We show that with orchestration, the protection needs for the entire Kubernetes cluster in terms of confidentiality, integrity and availability automatically become ”high” as soon as a sensitive data object is processed or stored in any container. Our analysis has shown that the SYS.1.6 module is generally suitable. However, we have identified three additional threats. Two of them could be exploited automatically, as soon as a respective vulnerability appears.

Cite

CITATION STYLE

APA

Haar, C., & Buchmann, E. (2021). Securing Orchestrated Containers with BSI Module SYS.1.6. In International Conference on Information Systems Security and Privacy (pp. 676–683). Science and Technology Publications, Lda. https://doi.org/10.5220/0010340406760683

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free