A New Method of Containment: IBM Nabla Containers - Printable Version +- Sick Gaming (https://www.sickgaming.net) +-- Forum: Computers (https://www.sickgaming.net/forum-86.html) +--- Forum: Linux, FreeBSD, and Unix types (https://www.sickgaming.net/forum-88.html) +--- Thread: A New Method of Containment: IBM Nabla Containers (/thread-86702.html) |
A New Method of Containment: IBM Nabla Containers - xSicKxBot - 10-02-2018 A New Method of Containment: IBM Nabla Containers <div style="margin: 5px 5% 10px 5%;"><img src="http://www.sickgaming.net/blog/wp-content/uploads/2018/10/a-new-method-of-containment-ibm-nabla-containers.png" width="300" height="157" title="" alt="" /></div><div><div class="lcom-stacked__main"> <div class="panel-pane pane-entity-field pane-node-body"> <div class="field field-name-body field-type-text-with-summary field-label-hidden"> <div class="field-items"> <div class="field-item even"> <p><em>By James Bottomley </em></p> <p>In the previous post about <a href="https://blog.hansenpartnership.com/containers-and-cloud-security/">Containers and Cloud Security</a>, I noted that most of the tenants of a Cloud Service Provider (CSP) could safely not worry about the Horizontal Attack Profile (HAP) and leave the CSP to manage the risk. However, there is a small category of jobs (mostly in the financial and allied industries) where the damage done by a Horizontal Breach of the container cannot be adequately compensated by contractual remedies. For these cases, a team at IBM research has been looking at ways of reducing the HAP with a view to making containers more secure than hypervisors. For the impatient, the full open source release of the Nabla Containers technology is <a href="https://nabla-containers.github.io/">here</a> and <a href="https://github.com/nabla-containers/">here</a>, but for the more patient, let me explain what we did and why. We’ll have a follow on post about the <a href="https://blog.hansenpartnership.com/measuring-the-horizontal-attack-profile-of-nabla-containers">measurement methodology for the HAP</a> and how we proved better containment than even hypervisor solutions.</p> <p>The essence of the quest is a sandbox that emulates the interface between the runtime and the kernel (usually dubbed the syscall interface) with as little code as possible and a very narrow interface into the kernel itself.</p> <h3>The Basics: Looking for Better Containment</h3> <p><a href="https://blog.hansenpartnership.com/a-new-method-of-containment-ibm-nabla-containers/standard-containers/"><img alt="" class="alignleft wp-image-498" height="159" src="http://www.sickgaming.net/blog/wp-content/uploads/2018/10/a-new-method-of-containment-ibm-nabla-containers.png" width="302" /></a>The HAP attack worry with standard containers is shown on the left: that a malicious application can breach the containment wall and attack an innocent application. </p> <p>Read more at <a href="https://blog.hansenpartnership.com/a-new-method-of-containment-ibm-nabla-containers/">Hansen Partnership</a></p> </div> </div> </div></div> </p></div> <p><a href="https://www.linux.com/popup/nojs" class="ctools-use-modal ctools-modal-subscription-modal-style element-invisible" title="">Click Here!</a> </p> </div> |