Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment

dc.contributor.author Pecka, Nicholas
dc.contributor.author Ben Othmane, Lotfi
dc.contributor.author Valani, Altaz
dc.contributor.department Electrical and Computer Engineering
dc.date.accessioned 2022-03-28T19:20:46Z
dc.date.available 2022-03-28T19:20:46Z
dc.date.issued 2022
dc.description.abstract Companies are misled into thinking they solve their security issues by using tooling that is advertised as aligning with DevSecOps principles. This paper aims to answer the question: Could the misuse of the DevOps pipeline subject applications to malicious behavior? To answer the question, we designed a typical DevOps pipeline utilizing ubernetes (K8s) as a case study environment and analyzed the applicable threats. Then, we developed four attack scenarios against the case study environment: maliciously abusing the user’s privilege of deploying containers within the K8s cluster, abusing the Jenkins instance to modify files during the continuous integration, delivery, and eployment systems (CI/CD) build phase, modifying the K8s DNS layer to expose an internal IP to external traffic, and elevating privileges from an account with create, read, update, and delete (CRUD) privileges to root privileges. The attacks answer the research questionpositively: companies should design and use a secure DevOps pipeline and not expect that utilizing software "advertised as aligning" with DevSecOps principles alone is sufficient to deliver secure software.
dc.description.comments This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Pecka, Nicholas, Lotfi ben Othmane, and Altaz Valani, "Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment." Proceedings of the International Conference on Software and Systems Processes (ICSSP), May 19-20, 2022. Virtual. Copyright 2022 ACM. Posted with permission.
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/dvmq3gbv
dc.language.iso en
dc.publisher ACM
dc.subject.keywords DevSecOps
dc.subject.keywords Security
dc.subject.keywords Kubernetes
dc.subject.keywords CI/CD
dc.title Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment
dc.type Preprint
dspace.entity.type Publication
relation.isAuthorOfPublication 0e086bfc-15b0-453d-8ea4-6a78df07b01b
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
2022-benOthame-PrivilegeEscalation.pdf
Size:
446.98 KB
Format:
Adobe Portable Document Format
Description:
Collections