F3.3 Contain Challenges Flashcards
What is one aspect VMs are better than Containers?
VMs are more secure
Are containers or VMs more suitable for micro-services, why?
Containers. They are lightweight and do NOT require a full OS image for each copy like VMs do
What are some threats that containers can come across?
- Applications inside containers taking control over the container
-Containers taking over other containers
- Containers taking over host
____ perform the job of isolating and virtualizing system resources for a collection of processes. _____ can solve the ‘inter-container protection’ and ‘protecting the
host from containers’ security issues
Linux kernel features
- Namespaces
_____ are Linux features that control the accountability and limitation of resource usage.
_____ solve ‘inter-container protection’ and ‘protecting the host from containers’ security
issues
Linux kernel features
- CGroups
______ are Linux features that turn the root and non-root dichotomy into fine-grained
access control. This poses a great danger because an attacker will be able to control the
entire system. Using ______, containers will not need to have full root privilege
Linux kernel features
- Capabilities
_____ is a Linux kernel feature that filters system calls
to the kernel. ______ is more fine-grained than capabilities since different _______ profiles can be applied to different filters. This helps reduce the number of system calls
coming from containers
Linux kernel features
- Seccomp (Secure Computation Mode)
____ allow a wide variety of security models to be implemented on the Linux
kernel. This means that a user can select the preferred implementation rather
than being forced to use the one that came with the OS.
Software-based solutions
- Linux security modules (LSMs)
LSMs
____ seamlessly protects containers from the underlying layers (e.g., cloud provider or host machine).
Hardware-based solutions
- Intel SGX
_____ exploits the out-of-order execution in modern processors to extract information about the OS and other containers
Meltdown
____ is another serious threat to containers, as it tricks other applications into accessing arbitrary locations in their memory
Spectre
Researchers showed that _____ contain many high-risk vulnerabilities
(30% to 90%), indicating a real issue with such images.
Docker images
As we have seen earlier, many of the security issues in containers arise from using unverified images. For example, Docker default installation does not check for image authenticity.
Notary can be used to verify Docker images’ authenticity; it is, however, a centralized solution
What could be a solution?
A better solution is to use decentralized verification, which could be done using BLOCKCHAIN
A _____________ is part of the architecture that is used to orchestrate
multiple container-based applications on heterogeneous computing nodes
Container Scheduler
There are two distinct types of container placement approaches, explain them
- Queuing: The queuing approach can be abstracted as a FIRST-IN-FIRST-OUT or priority-based method, where the container placement decision is made on a container-by-container basis.
- Concurrent: Computing requests are first shared and then placement decision is made