Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Our objective is to demonstrate the 5G SBP Use Case - Remote Attestation Use Case 1- IoT Device Security and Authentication, where SEDIMENT RA Verifier and an example Relying Party application are containerized and deployed with KubeArmor providing visibility and protection policies. Initially the result of attestation is to used to control access to the an example application.  In the future, this may be replaced by a third parry different application, or the attestation may be used to control network access through integration with the 5G ONAP AMF.  The onboarding of the device to be attested is outside the purview of this use case, and a separate use case will address that concern.

...

Remote Attestation Topology

** XXX: integrate both diagrams into a single view **

Image Removed

Note: In Phase 1, we will target only the Gateway security and not work on the device side of things.

Systems Requirements

** XXX: state this for verifier, app server, and device separately **

...

Image Added


SEDIMENT System Requirements

  • Ubuntu 20.04 docker containers for verifier, relying party,  app server, and prover (surrogate test device)
  • Memory: 8 GB
  • CPU: 4 VCPUs
  • Arch: x86_64

CPU: 4 vcpus

Memory: 8 GB

...

  • Networking:  The following TCP ports needs to be open for the corresponding containers

...

    • Relying Party: 22 (SSH), 8000 and 8101

...

      • must be able to open connection to 8001

    • Verifier: 22 (SSH), 8100, and 8050 (HTTP GUI)

      • must be able to open connections to 8000

    • Application Server:

...

    • 22 (SSH), 8001, and 8051 (HTTP GUI)

    • Device: 22 (SSH)

      • must be able to open connections to 8000 and 8100

** XXX: use open-source tools such as drawio and include sources if possible **

Image Removed

External Access: ssh access to the node would be required

SEDIMENT System Requirements

  • Ubuntu 20.04 docker container for replying party, verifier and app server
  • Memory: 8 GB
  • CPU: 4 cores

KubeArmor System Requirements

  • CPU: 100m (millicore) 100m = 1/10th of a vcpu (ref)
  • Memory: 100Mi 150Mi (ref)
  • karmor cli connects to kubearmor on port TCP/32767.

Deployment Mode

SEDIMENT Deployment Mode

** XXX: discuss each of the three parties **

...

For initial testing, SEDIMENT project will prepare four Docker containers: 

  1. SEDIMENT RA Verifier, to be protected using KubeArmor 
  2. SEDIMENT RA Relying Party, to be protected using KubeArmor
  3. Example application server (to be updated to accept camera feeds from an attested device)
  4. A surrogate for the device to be attested (to be later replaced by an actual camera device with SEDIMENT prover)

KubeArmor Deployment Mode

  • Deployed in systemd mode
  • Discovery Engine provides visibility into app behaviour and runs as host process.

Security use-cases to target with KubeArmor

  1. Visibility into SEDIMENT application behavior
    1. Identify the process forking behavior of the application
    2. Identify sensitive asset access of SEDIMENT
    3. Identify network access required by SEDIMENT
  2. Protection policies for Gateway deploying SEDIMENT Verifier.
    1. Process Whitelisting: Do not allow processes to execute within SEDIMENT container outside of the given spec.
    2. Network Access: Only allow SEDIMENT binaries to use the network primitives
    3. Check SEDIMENT configuration files and create a security net around SEDIMENT’s sensitive assets.
    4. Use host hardening policies to protect host.

Tasks/Action Items


Task

Description

Status

ETA

Owner

Document

For arch, sys requirements, deployment model etc

WIP

Done

20th April 2023

AccuKnox to create, and Peraton to update as necessary

Brief plan to 5G SBP WGDiscuss details of the use case demo plan with the 5G SBP WG in a bi-weekly meeting Done2nd May 2023Peraton + AccuKnox

SEDIMENT app containerization

WIP

Done

28th

5th,

April

May, 2023

Peraton Labs

Provision a common VM that can be used for tests

ssh sbp@

172.173.219.229 …

credentials will be provided to relevant folks

Done

20th April 2023

AccuKnox

Deploy

Provide containerized SEDIMENT to run on a

sample

Linux VM

TODO

/Host


Done

5th May, 2023

Peraton Labs

Identify prover device and camera
TODO
Peraton

Deploy KubeArmor on same VM as SEDIMENT

TODO 

Done


AccuKnox

Get KubeArmor visibility for SEDIMENT app

TODO

Done


AccuKnox

Apply protection policies for securing SEDIMENT

TODO

Done


AccuKnox

Identify lab requirements

Based on the VM used above, identify lab requirement

TODO


Peraton + AccuKnox +Kaloom

Implement in Kaloom lab
TODO
Peraton + AccuKnox +Kaloom

Joint Demo to 5G-SBP


TODO


Peraton + AccuKnox


  •   Ganesh Venkatraman , what is the status of current IBM environment/solution in Kaloom?

  •  Document proposed observability capabilities. Define observability capabilites/use case