34
PROF. CHRISTOF FETZER, PHD, TU DRESDEN, [email protected] SCONEDOCS.GITHUB.IO SCONE ( Secure CON tainer E nvironment) Trust Management in Edge Clouds with SCONE

Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, [email protected]

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

PROF. CHRISTOF FETZER, PHD, TU DRESDEN, [email protected] SCONEDOCS.GITHUB.IO

SCONE (Secure CONtainer Environment)

Trust Management in Edge Clouds with SCONE

Page 2: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

• Edge clouds provides clients with

• Low latency

• High Bandwidth

• Availability/Digital Resiliency (autonomous operation)

MotivationEDGE

CLOUD

CENTRAL CLOUD

Page 3: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

• Edge clouds provides clients with

• Low latency

• High Bandwidth

• Availability/Digital Resiliency (autonomous operation)

MotivationEDGE

CLOUD

CLOUD

Digital Resiliency

„Availability Zone“

Page 4: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

• Analysts expect:

• Large fraction of new cloud infrastructure investment will be spent on the edge

• Almost all workloads will be deployed with containers/microservices

• Large fraction of edge cloud will be „pay per use“ („edge cloud as a service“)

Expectations

container

MICROSERVICE A

Page 5: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

• Application

• Consists of microservices

• Microservice provides single type of resources

• REST API to access resources (https API)

Application = Set of Microservices

MICROSERVICEMICROSERVICEMICROSERVICE B

MICROSERVICE B…

scal

e

scal

e

MICROSERVICEMICROSERVICEMICROSERVICE A

MICROSERVICE A…

Page 6: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

Application = Set of Microservices

MICROSERVICEMICROSERVICEMICROSERVICE A

MICROSERVICE A…

MICROSERVICEMICROSERVICEMICROSERVICE B

MICROSERVICE B…

scal

e

scal

e

container

1-1 1-1 1-1

• Application

• Consists of microservices

• Microservice provides single type of resources

• REST API to access resources (https API)

• Deployment:

• each microservice runs in a separate container

Page 7: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

Vs Virtual Machines (VM)Container

• Containers: OS-based virtualization

• Less overhead ; very fast startup

• Convenient interface (via Docker)

CPU-based isolation

CHRISTOF FETZER, TU DRESDEN, [email protected]

OS-based Isolation

Page 8: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

• (Docker) Containers: are considered to be less secure than VMs

• Edge cloud: has weaker physical security than central cloud (e.g., shipping containers)

• Managed Service: Customer has to trust cloud provider to keep data and code confidential!

Digital Resiliency Challenges

(C) Cloud&Heat, 2020

edge cloud as shipping container

Page 9: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

• Customer:

• Delegates management of applications and services to (edge) cloud provider

• Customer and Edge cloud provider can use monitoring to show

• availability,

• durability,

• latency, and

• throughput.

General Approach

Page 10: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

• How can we ensure the confidentiality and integrity of

• Data,

• Code (e.g., Python code) and

• Secrets

• Of managed services without needing to trust the (edge) cloud provider?

Challenge

Page 11: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

THREAT MODELADVERSARY HAS ROOT & HW ACCESS!

ADVERSARY MANAGES SERVICES!

Page 12: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

Threat Model

systemServer

OS

RUNS ON TOP

SECRETS IN MAIN MEMORY

READ MAIN MEMORY

READ MAIN MEMORYBMC, DMAOS/HYPERVISOR HAS

LIMITED CONTROL OVER BMC, IOMMU …

ANY ROOT USERadversary (insider)

data, secrets, codeMICROSERVICE B

Adversary has hardware and root accessREAD MAIN MEMORY: VIOLATES CONFIDENTIALITY

WRITING MAIN MEMORY: VIOLATES INTEGRITY

Page 13: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

Threat Model

adversary (insider)

MICROSERVICE B

Adversary manages/operates services

MICROSERVICE A Configuration files

(including secrets)

Page 14: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

SCONE

Example: Confidential, Managed DB Service

Page 15: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

Edge cloud

Problem: How to protect database?

TLS

untrusted zone

DB

disk (encrypted)

encrypted

Standard:

- secure communication via TLS

- on disk encryption

main memory

Page 16: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

cloud

Problem: How to protect DB in a cloud?

TLS

untrusted zone

DB main memory

disk (encrypted)

encrypted

Standard:

- secure communication via TLS

- on disk encryption

adversary

Problem: untrusted zone

- adversary can read content of main memory

- adversary can read disk encryption key

- adversary can read content of TLS connection

Page 17: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

cloud

Approach: Execute in „Enclave“

TLS

untrusted zone

DBencrypted

Confidential Compute:

- main memory of DB encrypted

- secure communication via TLS

- on disk encryption

Encrypted Disken

clave

trusted zone

adversary

CPU extension

Enclave up to 64GB of main memory

Page 18: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

cloud

Problem: Key Management

TLS

untrusted zone

DBencrypted

Encrypted Disken

clave

trusted zone

encryption key

private key

adversary

Problem: How to provide DB with secrets?

- We need an encryption key for disk

- We need a private key for TLS

Background:

- enclave starts without secrets, i.e., content known by adversary

Page 19: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

cloud

Background

TLS

untrusted zone

DB

disk (encrypted)

encrypted

Standard:

- private key in file .key

- encryption key in configuration file

main memory

CONFIG: KEY=…

OS access protection

Page 20: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

cloud

Background

TLS

untrusted zone

DB

disk (encrypted)

encrypted

Standard:

- private key in file .key

- encryption key in configuration file

main memory

CONFIG: KEY=…

OS access protection

adversary

Problem:

- adversary with root access

- can read encryption key & private key

Page 21: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

cloud

SCONE Key Management

TLS

untrusted zone

DBencrypted

Encrypted Disken

clave

trusted zone

adversary

Approach:

- Files can be encrypted (transparently)

- Keys can be hidden from insiders

Background:

- SCONE ensures that only DB can decrypt configuration file

CONFIG: KEY=…

adversary

Page 22: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

THREAT MODELINSIDER ATTACKS

Page 23: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

cloud

Threat Model: Insider Attacks

TLS

untrusted zone

DBencrypted

Encrypted Disken

clave

trusted zone

adversaryCONFIG: KEY=…

adversary

trusted zone

insider

CONFIG: KEY=12345678

Original Config

reads/copies

Page 24: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

cloud

SCONE: Generate & Inject Keys

TLS

untrusted zone

DBencrypted

Encrypted Disken

clave

trusted zone

adversaryCONFIG: KEY=…

adversary

trusted zone

insider

CONFIG: KEY=$$DBKEY$$

Original Config

Sees only secret name

encla

veCAS

$$DBKEY$$=_!1K…

TLS

SECRETS are only seen by applications (not humans)SCONE CAS: Configuration and Attestation Service

Page 25: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

Better Trade-Offs Possible• Security

• end-to-end encryption & cryptographic access control

• fine-grain access control against insider attacks

• Outsourcing:

• provider cannot look into data

• managed: provider can administrate service without seeing dat

• Efficiency / low latency: New SGC CPUs provides good performance

• Query Expressiveness:

• Full query support

Security

Outsourcing/ Sharing

Efficiency / Latency

Query Expressiveness

(equiality, conjunction, comparison, subset, range, wildcard)

Page 26: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

SCONE

Safety and Security

Page 27: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

• Problem: Critical Applications

• Ensure confidentiality of input, output and all data during processing

• Ensure integrity despite execution errors (e.g., bit flips)

• Approach:

• ILR (instruction-level redundancy): all instructions are executed twice

• Similar to lock-step execution but in software on a single core

• Applicable to modern CPUs (non-deterministic, no lock-step support)

Safety and Security

Page 28: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

• Components:

• Compiler-based approach: application recompiled for ILR and to run inside of enclaves

• Attestation: remote clients can ensure that they communicate with correct application

• Automotive applications:

• Could offload even some critical (fail-stop) service in an edge cloud

SCONE Approach

Page 29: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

• Fault Injection:

• Undervolting: results in crash or wrong results (requires old firmware)

• ILR: detects wrong executions and exits program

• Overhead:

• Much lower than replicated execution on two CPUs or two hosts

Evaluation

Page 30: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

SCONE

Confidential Cloud-Native Apps

Page 31: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

• Confidential Cloud-Native Applications:

• application consisting of multiple microservices

• implemented in multiple programming languages and

• SCONE supports the programming languages (compiled, JIT and interpreted)

• One can run standard Kubernetes-based application - inside of SGX enclaves

• One can achieve good performance and very good security

• State of the art development support

• Integration with common CI/CDs and container-based deployment

Cloud-Native Applications

Page 32: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

SCONE

Summary

Page 33: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

CHRISTOF FETZER, TU DRESDEN, [email protected]

• Customer can protect

• confidentiality and

• integrity

• of managed applications using SCONE-based confidential compute

• Edge cloud provider manages services and ensures

• Availability

• High bandwidth

• Low latency

Summary

Page 34: Trust Management in Edge Clouds with SCONE...SCONE (Secure CONtainer Environment) Trust Management in Edge Clouds with SCONE CHRISTOF FETZER, TU DRESDEN, CHRISTOF.FETZER@TU-DRESDEN.DE

PROF. CHRISTOF FETZER, PHD, TU DRESDEN, [email protected] SCONEDOCS.GITHUB.IO

sconedocs.github.io

Questions?