论文标题

检测和表征基于木偶的基础架构管理中安全弱点的传播

Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based Infrastructure Management

论文作者

Rahman, Akond, Parnin, Chris

论文摘要

尽管有益于自动管理计算基础架构,但木偶表现很容易受到安全弱点的影响,例如硬编码的秘密和使用弱的加密算法的使用。因此,需要充分缓解木偶清单中的安全弱点,以确保用木偶表现管理的计算基础架构。安全弱点如何传播和影响基于木偶的基础架构管理的表征,可以告知从业者检测到的安全弱点的相关性,并帮助他们采取必要的缓解措施。为此,我们进行了一项实证研究,其中有17,629个木偶从336个开源存储库中挖掘出来。我们为木偶表现(TaintPup)构建污染跟踪器,与最先进的安全静态分析工具相比,我们观察到的精度高2.4倍。使用我们表征安全弱点的传播的taintpup利用特定于木偶的信息流分析。从我们的实证研究中,我们可以观察到安全弱点,可以传播到4,457个资源,即用于管理基础架构的木偶特定代码元素。安全弱点的一个实例可以传播到多达35个不同的资源中。我们观察到安全弱点以传播到7种资源,其中包括用于管理连续集成服务器和网络控制器的资源。根据我们与24位从业人员的调查,将安全弱点传播到与数据存储相关的资源中的评级为对基于木偶的基础架构管理产生最严重的影响。

Despite being beneficial for managing computing infrastructure automatically, Puppet manifests are susceptible to security weaknesses, e.g., hard-coded secrets and use of weak cryptography algorithms. Adequate mitigation of security weaknesses in Puppet manifests is thus necessary to secure computing infrastructure that are managed with Puppet manifests. A characterization of how security weaknesses propagate and affect Puppet-based infrastructure management, can inform practitioners on the relevance of the detected security weaknesses, as well as help them take necessary actions for mitigation. To that end, we conduct an empirical study with 17,629 Puppet manifests mined from 336 open source repositories. We construct Taint Tracker for Puppet Manifests (TaintPup), for which we observe 2.4 times more precision compared to that of a state-of-the-art security static analysis tool. TaintPup leverages Puppet-specific information flow analysis using which we characterize propagation of security weaknesses. From our empirical study, we observe security weaknesses to propagate into 4,457 resources, i.e, Puppet-specific code elements used to manage infrastructure. A single instance of a security weakness can propagate into as many as 35 distinct resources. We observe security weaknesses to propagate into 7 categories of resources, which include resources used to manage continuous integration servers and network controllers. According to our survey with 24 practitioners, propagation of security weaknesses into data storage-related resources is rated to have the most severe impact for Puppet-based infrastructure management.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源