Cargando…

Analyzing Infrastructure as Code to Prevent Intra-update Sniping Vulnerabilities

Infrastructure as Code is a new approach to computing infrastructure management that allows users to leverage tools such as version control, automatic deployments, and program analysis for infrastructure configurations. This approach allows for faster and more homogeneous configuration of a complete...

Descripción completa

Detalles Bibliográficos
Autores principales: Lepiller, Julien, Piskac, Ruzica, Schäf, Martin, Santolucito, Mark
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7984555/
http://dx.doi.org/10.1007/978-3-030-72013-1_6
_version_ 1783668090168410112
author Lepiller, Julien
Piskac, Ruzica
Schäf, Martin
Santolucito, Mark
author_facet Lepiller, Julien
Piskac, Ruzica
Schäf, Martin
Santolucito, Mark
author_sort Lepiller, Julien
collection PubMed
description Infrastructure as Code is a new approach to computing infrastructure management that allows users to leverage tools such as version control, automatic deployments, and program analysis for infrastructure configurations. This approach allows for faster and more homogeneous configuration of a complete infrastructure. Infrastructure as Code languages, such as CloudFormation or TerraForm, use a declarative model so that users only need to describe the desired state of the infrastructure. However, in practice, these languages are not processed atomically. During an upgrade, the infrastructure goes through a series of intermediate states. We identify a security vulnerability that occurs during an upgrade even when the initial and final states of the infrastructure are secure, and we show that those vulnerability are possible in Amazon’s AWS and Google Cloud. We call such attacks intra-update sniping vulnerabilities. In order to mitigate this shortcoming, we present a technique that detects such vulnerabilities and pinpoints the root causes of insecure deployment migrations. We implement this technique in a tool, Häyhä, that uses dataflow graph analysis. We evaluate our tool on a set of open-source CloudFormation templates and find that it is scalable and could be used as part of a deployment workflow.
format Online
Article
Text
id pubmed-7984555
institution National Center for Biotechnology Information
language English
publishDate 2021
record_format MEDLINE/PubMed
spelling pubmed-79845552021-03-23 Analyzing Infrastructure as Code to Prevent Intra-update Sniping Vulnerabilities Lepiller, Julien Piskac, Ruzica Schäf, Martin Santolucito, Mark Tools and Algorithms for the Construction and Analysis of Systems Article Infrastructure as Code is a new approach to computing infrastructure management that allows users to leverage tools such as version control, automatic deployments, and program analysis for infrastructure configurations. This approach allows for faster and more homogeneous configuration of a complete infrastructure. Infrastructure as Code languages, such as CloudFormation or TerraForm, use a declarative model so that users only need to describe the desired state of the infrastructure. However, in practice, these languages are not processed atomically. During an upgrade, the infrastructure goes through a series of intermediate states. We identify a security vulnerability that occurs during an upgrade even when the initial and final states of the infrastructure are secure, and we show that those vulnerability are possible in Amazon’s AWS and Google Cloud. We call such attacks intra-update sniping vulnerabilities. In order to mitigate this shortcoming, we present a technique that detects such vulnerabilities and pinpoints the root causes of insecure deployment migrations. We implement this technique in a tool, Häyhä, that uses dataflow graph analysis. We evaluate our tool on a set of open-source CloudFormation templates and find that it is scalable and could be used as part of a deployment workflow. 2021-02-26 /pmc/articles/PMC7984555/ http://dx.doi.org/10.1007/978-3-030-72013-1_6 Text en © The Author(s) 2021 Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
spellingShingle Article
Lepiller, Julien
Piskac, Ruzica
Schäf, Martin
Santolucito, Mark
Analyzing Infrastructure as Code to Prevent Intra-update Sniping Vulnerabilities
title Analyzing Infrastructure as Code to Prevent Intra-update Sniping Vulnerabilities
title_full Analyzing Infrastructure as Code to Prevent Intra-update Sniping Vulnerabilities
title_fullStr Analyzing Infrastructure as Code to Prevent Intra-update Sniping Vulnerabilities
title_full_unstemmed Analyzing Infrastructure as Code to Prevent Intra-update Sniping Vulnerabilities
title_short Analyzing Infrastructure as Code to Prevent Intra-update Sniping Vulnerabilities
title_sort analyzing infrastructure as code to prevent intra-update sniping vulnerabilities
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7984555/
http://dx.doi.org/10.1007/978-3-030-72013-1_6
work_keys_str_mv AT lepillerjulien analyzinginfrastructureascodetopreventintraupdatesnipingvulnerabilities
AT piskacruzica analyzinginfrastructureascodetopreventintraupdatesnipingvulnerabilities
AT schafmartin analyzinginfrastructureascodetopreventintraupdatesnipingvulnerabilities
AT santolucitomark analyzinginfrastructureascodetopreventintraupdatesnipingvulnerabilities