【24h】

Analyzing Infrastructure as Code to Prevent Intra-update Sniping Vulnerabilities

机译:分析基础架构作为代码,以防止intern-update狙击漏洞

获取原文

摘要

Infrastructure as Code is a new approach to computing infrastructure management that allows users to leverage tools such as version control, automatic deployments, and program analysis for infrastructure configurations. This approach allows for faster and more homogeneous configuration of a complete infrastructure. Infrastructure as Code languages, such as CloudFormation or TerraForm, use a declarative model so that users only need to describe the desired state of the infrastructure. However, in practice, these languages are not processed atomically. During an upgrade, the infrastructure goes through a series of intermediate states. We identify a security vulnerability that occurs during an upgrade even when the initial and final states of the infrastructure are secure, and we show that those vulnerability are possible in Amazon's AWS and Google Cloud. We call such attacks intra-update sniping vulnerabilities. In order to mitigate this shortcoming, we present a technique that detects such vulnerabilities and pinpoints the root causes of insecure deployment migrations. We implement this technique in a tool, Hayha, that uses dataflow graph analysis. We evaluate our tool on a set of open-source CloudFormation templates and find that it is scalable and could be used as part of a deployment workflow.
机译:作为代码的基础架构是计算基础架构管理的新方法,允许用户利用诸如版本控制,自动部署和基础架构配置的程序分析等工具。这种方法允许更快更加均匀地配置完整的基础设施。基础架构作为代码语言,如CloudFormation或Terraform,使用声明性模型,以便用户只需要描述基础架构的所需状态。但是,在实践中,这些语言不会原子处理。在升级期间,基础架构通过一系列中间状态。我们确定即使基础架构的初始和最终状态是安全的,我们也会识别升级期间发生的安全漏洞,并且我们表明在亚马逊的AWS和Google云中可以实现这些漏洞。我们称此类攻击intrare-update狙击漏洞。为了缓解这种缺点,我们提出了一种检测此类漏洞的技术,并针对不安全部署迁移的根本原因。我们在使用DataFlow Graph分析的工具中实现了这种技术。我们在一组开源CloudFormation模板上评估我们的工具,并发现它是可扩展的,可以用作部署工作流的一部分。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号