How to implement an open source container security stack (part 1).

By Mateo Burillo - JULY 12, 2018

SHARE:

Facebook logo LinkedIn logo X (formerly Twitter) logo
Open Source Container Security Runtime Security

Container security is top-of-mind for any organization adopting Docker and Kubernetes, and this open source security guide is a comprehensive resource for anyone who wants to learn how to implement a complete open source container security stack for Docker and Kubernetes.

Securing a container platform is a multi-step process spanning from development to production.

There are Docker security best practices for packaging apps as containers. Security must be implemented at the Infrastructure layer, including host, Docker and Kubernetes. Our Kubernetes Security Guide goes through how to secure Kubernetes cluster, components and use Kubernetes features to increase security in your apps, like RBAC, TLS, Pod Security Policies or Network Policies.

But additional security gaps remain, such as:

  1. Image vulnerabilities. Whether you are building your own images for your apps or you are using unmodified third party images, you need to track down any known vulnerability present in those images. This is known as Docker image scanning. Our second part will show how to implement open source Docker scanning.
  2. Container abnormality detection. Production is the longest period of a container lifecycle, what happens after deployment? Is your container doing what is supposed to do? This is going to be out first part, how to implement runtime security with open source tools.
Using @Sysdig #Falco, @nats_io and @Bitnami Kubeless FaaS to deploy a complete #container #Kubernetes #security opensource stack. Click to tweet

Abnormality detection for containers {#abnormality detection}

If a container is not running as expected, could be an attack that exploited a well known vulnerability -and this can be potentially catched with container image scanning- but there are other possible reasons outside this approach. We need to analyze the container behaviour at execution time to protect from:

  • Bogus configuration, intentional or not, leading to data losses, security intrusion and eventually information disclosure.
  • 0-day vulnerabilities or vulnerabilities in your own software.
  • Weak or leaked credentials, keys and other sensitive information that might allow remote access.
  • Resource abuse for cryptocurrency mining or just DoS. We wrote about this in: “Fishing for Miners – Cryptojacking Honeypots in Kubernetes“.

Monitoring container behaviour at execution time

Containers are designed to be simple (typically a single process with only the required dependencies and libraries, and often as part of a microservices app, so performing a single task), thus, it is relatively easy to define a behavior pattern through strict whitelists that detect any action that deviates from the norm:

  • File directories and paths that can be accessed and/or written.
  • Binaries that should be running.
  • External services that should be contacted and in general network connections.
  • System calls that can be executed.

Indicators of compromise can be also identified through blacklists, patterns of behavior that we know should never happen, like:

  • Writing files in binary paths. Containers are meant to be immutable and in-place upgrades should never happen.
  • Writing files in configuration paths like /etc. For the same reasons we shouldn’t reconfigure services while running.

Understanding Response Engine and Security Playbooks

There are a few parts that compose our container security framework:

  • An agent that can provide live visibility and observability of the container internal behavior (open files, open network connections, processes executed, etc).
    • Behavioral rules that can determine what is considered “normal” for this container and what should be notified.
    • Indicators of compromise that can identify possible anomalous activity, a symptom of a potential security intrusion.
  • A response engine, reacting to the events of the monitoring agent, from just routing the warning messages to a notification endpoint or a logging or audit system, to performing more preventive actions to stop or mitigate the attack.
  • Security playbooks contain the steps to be taken to respond to a security incident. These can be either a manual process or written as code and run in an automated way.

While detecting anomalous behavior in your containers is step one, and step two is responding to or mitigating the attack in an automated way. In the Docker and Kubernetes world, it’s important to keep in mind that:

  • Kubernetes clusters span a large number of nodes and container deployments, which can make it challenging to correlate the execution time alert and the originating container.
  • Any reaction to a security incident needs to be fast. Because containers have short lifespans, it’s essential to find the culprit before the container causes any real damage or simply disappears or moves somewhere else. Automation is more important than ever, and writing response procedures as code playbooks is the best approach.

Container Security – Open Source Tools

There are a variety of Linux security open source tools. Seccomp, SELinux/Auditd and Appamor are traditional system call audit and enforcement tools that can be applied to container.

Sysdig Falco focuses on behavior monitoring. In a nutshell:

  • Falco gains visibility inside the containers through system call instrumentation, with great performance and very little overhead, so can run in production systems.
  • System call instrumentation is completely transparent to your containers, so you don’t need to modify your code, container images or inject or preload libraries. System call interception is done either through a simple kernel module dynamically compilled with DKMS or through an eBPF probe.
  • When an anomalous activity is detected, a security event, like an alert is emitted. The conditions that trigger the alert are defined by your policy, a collection of rules which syntax is easy, simple and very similar to tcpdump and Sysdig. You will find yourself writing rules before you realize.
  • Falco is container native, so rules and alerts are going to understand what is a process but also a container or a Kubernetes pod.

To learn more about how other security tools compare to Falco, have a look at “SELinux, Seccomp, Sysdig Falco, and you: A technical discussion“.

Falco is extremely effective in part because its rules can use context from the low level operating system interface (syscalls) together with Docker container or Kubernetes orchestration metadata (container information, namespaces, deployment, pods, etc).

For example, you can build a Falco rule that will detect any listening socket outside our expected one, when:

  • The container image is myregistry/nginx.
  • The listening process inside that container is nginx.
  • The Kubernetes namespace is load-balancer.

Anything else should trigger an alert:

condition: evt.type in (accept,listen) and (container.image!=myregistry/nginx or proc.name!=nginx or k8s.ns.name!="load-balancer")
Code language: JavaScript (javascript)

This is a good example combining conditions from different sources:

  • System call events:
    • i.e. evt.type = listen, evt.type = mkdir, evt.type = setns, etc.
  • Docker metadata:
    • i.e. container.image, container.privileged, container.name, etc.
  • Process tree information:
    • i.e. proc.pname, proc.cmdline, etc.
  • Kubernetes namespace metadata:
    • i.e. k8s.ns.name, k8s.pod.name, etc.

It provides the flexibility and expressiveness needed to create accurate security rules that fully understand your operational entities.

Building a Kubernetes Security Stack with Open Source Tools

While Falco provides deep visibility into what’s happening inside containers, creating a complete container security stack requires additional components. There are open source components that can be tied together to build a Kubernetes security stack:

Kubernetes Security Stack with Open Source Tools
  • Use case: Gain visibility inside your containers and applications running in Kubernetes, including cluster services.
  • Tool: Sysdig Falco. Falco provides great visibility and has Docker and Kubernetes native support. Install Falco in Kubernetes is really easy: it’s shipped as a Docker container (amongst other options like deb/rpm) deployed with a DaemonSet, but we have also created a Helm chart to streamline configuration and deployment process.

  • Use case: Define your security policy for applications, services and the cluster.

  • Tool: Falco default ruleset library for the most popular Docker images. Creating Falco rules isn’t difficult but can be laborious for newcomers. Leverage our library of default rulesets for the most popular Docker images including kube-system components, Nginx, HAproxy, Apache, Redis, MongoDB, Elastic, PostgreSQL, etc.

  • Use case: Response engine to forward security events based on your policy violations.

  • Tool: NATS Falco evaluates the rules and triggers alerts. A small forwarder in a container within the same pod reads the alerts through a named pipe and then sends them to NATS using TLS. NATS is a messaging broker so other parties can consume the security events.

  • Use case: Incident response through security playbooks.

  • Tool: Kubeless for FaaS scripts. Kubeless is a Function as a Service framework for Kubernetes. Will subscribe and listen for events on NATS executing different playbooks for incident response and attack mitigation, automated actions written as code. For example, will post a notification to Slack, connect to the Kubernetes API server to stop the pod, or create a Network Policy that will isolate the pod from the network.

  • Use case: Logging, audit and reporting.

  • Tool: EFK. Falco doesn’t implement any persistent storage. If you need to check the historical event log, perform data analysis, reporting etc. you can easily integrate Falco with third party logging tools like EFK: Fluentd + Elastic + Kibana.

Gain Visibility Inside your Containers and Applications with Sysdig Falco (installation steps included)

If you are already using Helm for managing your Kubernetes applications, then you can install Falco in a few seconds with a simple command using the Falco Helm chart:

$ helm install --name sysdig-falco-1 --set integrations.natsOutput.enabled=true stable/falco
Code language: JavaScript (javascript)

This method provides several advantages:

  • All the benefits of installing Falco as a Kubernetes DaemonSet, so you don’t need to repeat the deployment on new nodes that will get Falco automatically.
  • Easier, faster, automated.
  • Configuration and rulesets managed by the chart, creating portable and repeatable configuration.
  • Bundles some integrations out of the box, like Kubernetes RBAC permissions.

You have more details about this installation method on “Automate Sysdig Falco Deployment Using Helm Charts“.

Define your own container security policy for applications, services and the cluster with falco default ruleset library

Most of us build our Cloud Native applications using open-source components. Thus, we have created a library with a growing list of Falco default ruleset for the most popular container images.

If you are using these images to build for services or as a base image to containerize your applications, you can simply adapt volume paths and maybe network connections to start. In the GitHub repository: falco-extras, you will find rules for:

  • Kubernetes 1.10 cluster components:
    • apiserver
    • controller-manager
    • kube-dns
    • kube-scheduler
    • dashboard
  • Google Kubernetes Engine components
  • Apache
  • Consul
  • ElasticSearch
  • etcd
  • Fluentd
  • HAproxy
  • MongoDB
  • Nginx
  • PHP-FPM
  • PostgreSQL
  • Redis
  • Traefik

As example, let’s show how the Nginx ruleset would detect an ls command:

# cp ~/falco-extras/rules/rules-nginx.yaml /etc/falco/falco_rules.local.yaml
# service falco restart
$ docker run -d -P --name mynginx nginx
$ docker exec mynginx ls
$ cat /var/log/falco.log
11:03:13.464648222: Notice Unexpected process spawned in nginx container (command=ls  pid=26942 user=root mynginx (id=4f94bdd87187) image=nginx)
Code language: PHP (php)

The ls command is not a whitelisted binary in this template.

Using these default Falco security rulesets you will probably save a considerable ammount of time. However, keep in mind that every version or even tag of a Docker container image is unique, and may have differences in user-defined data directories, binary paths, scripts that need to access some external port or device, or the configuration. You will need to adapt the templates to your specifics before actually using them in production.

If you want to use these rulesets from the library plus you own customization with the Helm chart, use this script to generate the Helm configuration:

$ git clone https://github.com/draios/falco-extras.git
$ cd falco-extras
$ ./scripts/rules2helm rules/rules-traefik.yaml rules/rules-redis.yaml > custom-rules.yaml
$ helm install --name sysdig-falco-1 -f custom-rules.yaml stable/falco
Code language: PHP (php)

There are complete instructions, practical examples and more information about the library of Falco default rulesets in the “Protect your Docker containers using Falco security rules. “.

Kubernetes Incident Response

Deploying Kubernetes Response Engine Components: NATS and Kubeless framework

In order to install the NATS and Kubeless components in your Kubernetes cluster, you need to meet the following prerequisites:

  • The kubectl command and configured to access your Kubernetes cluster.
  • The pipenv python package. If you haven’t installed it yet, you can use pip:

    $ pip install –user pipenv

  • The kubeless command. Have a look at the Kubeless Quick Start guide to learn how to install it.

Once you have checked the list above, you just need to clone the Falco repo and then:

$ git clone https://github.com/draios/falco.git
$ cd integrations/kubernetes-response-engine
$ cd deployment/cncf
$ make
Code language: PHP (php)

The make will use kubectl to deploy NATS using a Kubernetes Operator and the Kubeless framework that makes use of Kubernetes Custom Resource. The nats-operator might require additional time to complete the deployment and begin processing objects kind: NatsCluster. Once the deployment is finished, you can configure the different Kubernetes security playbooks.

Deploying Kubernetes Security Playbooks on Kubeless

The response engine will classify and store the security events, providing a reliable timestamping, publishing, queuing and subscription mechanism. Now we need a consumer that is subscribed to an event or set of events and triggers the desired action, response or mitigation, this is what we call a “Kubernetes security playbook”.

Our playbooks are currently implemented using Kubeless functions. Kubeless allows us to deploy a function and subscribe to a NATS topic, so it’s a perfect match.

Every time we receive a matching NATS message, our Kubeless function will be run. This design allows for modularity and composability, you can run independent functions that react to each topic filter or an entire category.

The sequence of a Falco alert until a playbook function is triggered will follow a journey through the different components of the system:

  1. Falco evaluates the rules in real time and writes any triggered alert into a Linux pipe so it doesn’t require any persistent storage in that Kubernetes pod.

  2. A sidecar container falco-nats receives these events through the pipe and performs some basic formatting to facilitate metadata extraction. Then queues the notification on NATS, published under a topic with the following format:

falco.{severity}.{rule name slugified} i.e. falco.error.write_below_etc

  1. The Kubeless functions can subscribe to the different NATS topics, which allows you to group, filter or ignore the different alerts as you see fit, performing a different action per group/filter you declare. For example, any message on falco.warning.* will trigger a notification, but falco.error.write_below_etc in particular will trigger a container deletion.

Kubernetes Security Playbook: Slack Webhook Notification

Let’s start with sending a notification using a webhook.

For example, you can create a Slack app, and once you have authorized and configured the details, you will be able to post messages to a channel using a custom URL.

You can easily create a “catch-all” notification function:

$ cd reactions
$ ./deploy_playbook -r slack -e SLACK_WEBHOOK_URL=https://<custom_slack_app_url> -t "falco.*.*"
Code language: HTML, XML (xml)

This deploys the Kubeless function that subscribes to the NATS falco.*.* topic(s).

If you need to specify multiple options, you can use the -e parameter several times. You can also subscribe a Kubeless function to several topics using the -t parameter multiple times.

If you just want to test things, Falco includes a falco-event-generator pod that intentionally fires several Falco alerting conditions included in the default configuration. You should start receiving these events in your Slack channel within a few seconds:

Falco Playbook Response Engine

Kubernetes Security Playbook: Delete Offending Pod

A more strict reaction to respond an incident could be directly killing the Pod that triggered the security alert. This is done connecting to the Kubernetes API and deleting that Pod.

You can also deploy this function to your Kubeless using a similar command:

$ ./deploy_playbook -r delete -t "falco.notice.terminal_shell_in_container"
Code language: JavaScript (javascript)

Everytime we receive a Terminal shell in container alert from Falco this reaction will kill the container stopping the Pod via the Kubernetes API.

Kubernetes Security Playbook: Taint a Node and Stop Scheduling

A very interesting response would be to put aside the node where the offending container was running, so nothing else is scheduled there. You can assign flags (taints and tolerations) to the Kubernetes node where the alert originated to achieve different effects.

$ ./deploy_playbook -r taint -t "falco.notice.contact_k8s_api_server_from_container" [-e PARAMETER]
Code language: JavaScript (javascript)

Parameters:

  • TAINT_KEY: This is the taint key. Default value: falco/alert
  • TAINT_VALUE: This is the taint value. Default value: true
  • TAINT_EFFECT: This is the taint effect. Default value: NoSchedule

In the example, we are executing without parameters, it will use the default taint falco/alert=true:NoSchedule so no news Pods will be scheduled in this node unless they can tolerate that specific taint. You can use a more aggressive approach and set -e TAINT_EFFECT=NoExecute, which will drain the affected node.

Kubernetes Security Playbook: Pod Network Isolation

If you suspect the attacker is trying to hijack its neighbors and spread across the cluster (doing network scanning, vulnerability probing, connecting to external IP addresses, etc), then you can isolate the Pod from the network.

The “isolate” reaction denies all ingress/egress traffic from a Pod. This reaction requires a Kubernetes cluster / Pod overlay network that supports Kubernetes Network Policies.

$ ./deploy_playbook -r isolate -t "falco.notice.unexpected_network_connection"
Code language: JavaScript (javascript)

So as soon as we notice an unexpected network connection, we isolate that Pod, avoiding further network activity.

Kubernetes Security Logging with Falco & Fluentd

In addition to running playbooks, you may want to have a long-term event storage to enable reporting, historical trend visualization or data mining of your security events.

Fluentd is deployed by default on several Kubernetes distributions so we decided to go with the EFK (Fluentd, Elastic, Kibana) stack here.

Enable the Falco JSON-formatted event output to stdout and Fluentd will take it from there. You can find the complete deployment instructions and configuration options in “Kubernetes Security Logging with Falco & Fluentd” to learn how to:

  • Deploy the EFK stack in your Kubernetes cluster
  • Deploy a compatible Falco DaemonSet that gets scraped by Fluentd
  • Filter the relevant Falco events from the bulk input
  • Configure awesome event visualizations in Kibana
Kubernetes EFK Stack Response Engine Playbook

Falco security events in Kibana

But if you are already using a SIEM product, then consolidating Falco alerts there is also quite easy. As an example we wrote a Falco connector for Google Cloud Security Command Center.

Kubernetes Response Engine Playbook Google Security Command Center

Falco security events with Kubernetes information in SCC

Conclusions

In this post we have explained how to integrate the Falco container security framework with some of the typical Cloud Native Kubernetes tooling like Helm, NATS and Kubeless to help you build a comprehensive open source container security stack.

Excited already? We hope you can use this as a whole open source container security stack or you might just pick the ideas and tools that are more useful to you, customize and adapt them to your use cases.

But we haven’t finished yet, in addition to behavioural container security, we are also going to integrate Docker image scanning, continue reading into How to Implement Open Source Container Security: Part 2 Docker Image Scanning.

If you liked this and you want to contribute to this project, there are many ways to do so:

Join the discussion on Sysdig’s open source Slack community, #open-source-sysdig or reach out us via Twitter on @sysdig!

Subscribe and get the latest updates