<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1919858758278392&amp;ev=PageView&amp;noscript=1">

Securing Immutable Servers in a Serverless World

Jul 6, 2017 11:30:00 AM By Derek Weeks

blog pic 3.png

Snowflakes are beautiful, unique creations. But, let’s keep them in nature. They don’t belong in our server infrastructure. Snowflake servers, where every configuration is just a little different, can introduce unnecessary security vulnerabilities and complications. While common in IT infrastructure, in the DevOps realm they are gradually becoming ancient history.

At All Day DevOps 2016, Erlend Oftedal (@webtonull), with Blank and head of the OWASP Norway chapter, discussed the benefits of immutable infrastructure practices within serverless architectures. Erlend walked us through the positive effects on security as well as offered insight on potential problems.

Erlend outlined the progress from physical servers to immutable servers, discussing the benefits of each step and the concerns that lead to the next phase, ending with immutable servers - that is, they can’t be changed. Once setup, they are set. Automated processes coupled with  immutability principles can eliminate snowflake servers.

blog pic 1.png

Immutability isn’t a new concept. Some classic examples include: live Linux CDs, Internet cafes, schools, libraries, hotel business centers, etc. To set up immutable servers, Erlend outlines these steps:

  1. Find a suitable base image
  2. Build a specific image for the application
    1. Dependencies
    2. Application
    3. Secrets
  3. Deploy image to the server(s)
  4. Repeat steps 2-3 for new versions

blog pic 2.png

Of course, this immediately raises questions.

What about data?  He notes that because data inherently changes, data has to be stored externally.

How do you deploy changes?  Well, you don’t change the server. You take one out and put a new one in. What if that one fails?  Rollback to the previous one.

How do you manage secrets?  You can build secrets in, leverage cloud key management, or use third-party services.

How do we apply security patches?  If truly immutable, you deploy a new server with the patch. However, you can have a semi-immutable server that allows for automatically installing patches but still doesn’t allow for logins or manual changes.

Speaking of security, what are the security advantages? For starters, if an attacker is in your server, they will be thrown out when you change servers, although they may come back if the vulnerability isn’t patched. It also allows for very specialized images by removing all unnecessary packages.  With these specialized images, you can more easily audit and monitor the system for unexpected file changes, logins, and connections.

blog pic 3.png

Erlend discussed containers because they are a step closer to a serverless world. Containers isolate processes and all run on the same OS. Of course, you can make them immutable, but, whether they are or are not, there are some key security best practices you’ll want to consider:

  • Don’t run as root inside container
  • Implement user namespaces so the root account within the container is separated from the root account outside the container
  • Utilize the least privileges necessary for capabilities and resources
  • Keep them up-to-date
  • Automate scanning using tools such as Sonatype Nexus, Twistlock, Clair, or Aqua
  • Separate untrusted and trusted containers

Erlend also dove into serverless architecture. While there is debate over what exactly qualifies as serverless, there are 5 principles that Erlend highlighted:

  • Use a compute service to execute code on demand
  • Write single-purpose, stateless functions
  • Design push-based, event-driven pipelines
  • Create thicker, more powerful front ends
  • Embrace third-party services

Migrating to immutable, serverless infrastructure is a topic to be discussed well beyond this blog post and even Erlend’s session. Whatever you do in the future, though, take his parting words to heart: “the cloud can solve many of your problems, but in the end you cannot transfer your responsibility for security.”

Erlend’s session was packed with information. If this piqued your interest, you should watch his complete session from All Day DevOps 2016 (just 30 minutes). The other 56 presentations from the conference are also available online, free-of-charge here.

Also, this year's All Day DevOps is on October 24. It's online and free, so be sure to check out www.alldaydevops.com to learn more and register.