Kubernetes Threat Modeling
Every security team has to deal with one question: “Are my services/deployments secure?”
Answering this is non-trivial, and involves understanding the threat vectors faced by the services. To understand threat vectors one needs an understanding of how the services works, what communication primitives are used, how is the data stored and how is the access governed. The threat vector will be different for different services or different deployments of a given service.
Threat modeling helps the security or development team to understand the possible threats to the given system or deployment.
The input to threat modeling could be a system design or a deployment architecture with the specified trust boundaries. The output of a Threat modeling activity is a list of possible threats to the system/deployment. The team can then evaluate each of the possible attacks and provide a mitigation or investigation strategy.
Zero Trust and Trust Boundaries in the Threat Model
ZTA (Zero Trust Architecture) assumes there is no implicit trust granted based solely on the physical or network location or based on asset ownership. Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established.
The trust boundaries in the threat model allowed one to configure a trust domain within which the services could trust each other. ZTA removes any such assumptions i.e., even within the trust boundaries of a threat model the services have to authenticate and authorize explicitly.
Templates used by the Threat model should consider the ZTA aspect and should not assume implicit trust within the trust boundaries. The trust boundaries in essence would only indicate operational/management boundaries for the system.
While there are multiple approaches for Threat Modeling, the STRIDE approach pioneered at Microsoft is the most popular approach in software engineering. STRIDE stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.
STRIDE requires one to decompose the system into components, modules and identify relation (connectivity) between them. You establish what is the trust boundary for the modules or group of modules and then generate a report. The report essentially explains the susceptibility to the threats. The design, or the security team could then evaluate individual threats and investigate them.
When should Threat Modeling be done?
Trust boundaries and threat indicators will change over a course of time as the design evolves and so should the Threat Model of a given system.
Threat Modeling is not a one-time activity and it should to be tied up to the design updates of the given system as part of the software development/deployment lifecycle. It is advisable to integrate it as part of the software development life cycle, especially whenever the new requirements results in a design or deployment architecture impact.
Who should do it?
Development Team (Systems Engineer): A dev team should consider making Threat modeling an integral part of the design specifications. Typically the design is used by the QA team, and by the documentation team for further more derivatives such as Test design and documentation design. A Threat Model could help the QA team to better understand the security aspects of the design and prepare test design for the same.
Security Team: Threat Modeling enables a methodical approach for the security team to identify possible threats in a given system. The generated threat report can then be used to evaluate the actual threats.
How to do Threat Modeling?
Microsoft provides a Threat Modeling Tool (MS TMT) that allows not only to prepare a model from given templates but it also allows new templates to be created for different systems. (Brilliant work MS, and thank you for making the tool available to all).
We have prepared a new template that works with MS-TMT specifically for Kubernetes-native applications and modeled the open source k8s-native tool KubeArmor. The k8s-template allows to import k8s entities such as pods, daemonsets, services, deployments, etc into the model and use k8s-specific trust boundaries such as “cluster trust boundary”, “node trust boundary”, “namespace trust boundary”.
Step-By-Step Guide for Threat Modeling
This article will focus on the STRIDE approach for threat modeling and will be using Microsoft’s MS-TMT app. We have prepared a k8s-stencils-template that could be used with the tool making it easier to model applications, services, agents based on k8s-native philosophy.
This step involves:
- Preparing a system’s interaction diagram or deployment architecture
- specifying the trust boundaries Reuse existing system design diagrams and apply trust boundaries as necessary.
Note that it is not necessary to get all the interactions correct in the first phase. You can have a simplistic view and then later keep on adding new entities/components to your model and apply new trust boundaries.
Once the model is prepared click on “Switch to Analysis View” to check all the detected threats.
To get a detailed report use, “Reports -> Create Full Report…”. The report would be saved in an HTML file. For sample report, check here.
For the reported threats provide an analysis, stating whether:
- the threat needs Investigation
- it is “Not Applicable” and provide a justification
- it is Mitigated because of some action already taken
I help fin-tech digital product teams to create amazing experiences by crafting top-level UI/UX.