Skip to main content
Presentation
Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment
International Conference on Software and System Processes (2022)
  • Nicholas Pecka, Iowa State University
  • Lotfi Ben Othmane, Iowa State University
  • Altaz Valani, Security Compass
Abstract
Companies are misled into thinking they solve their security issues by using tooling that is advertised as aligning with DevSecOps principles. This paper aims to answer the question: Could the misuse of the DevOps pipeline subject applications to malicious behavior? To answer the question, we designed a typical DevOps pipeline utilizing Kubernetes (K8s) as a case study environment and analyzed the applicable threats. Then, we developed four attack scenarios against the case study environment: maliciously abusing the user’s privilege of deploying containers within the K8s cluster, abusing the Jenkins instance to modify files during the continuous integration, delivery, and deployment systems (CI/CD) build phase, modifying the K8s DNS layer to expose an internal IP to external traffic, and elevating privileges from an account with create, read, update, and delete (CRUD) privileges to root privileges. The attacks answer the research question positively: companies should design and use a secure DevOps pipeline and not expect that utilizing software "advertised as aligning" with DevSecOps principles alone is sufficient to deliver secure software.
Keywords
  • DevSecOps,
  • Security,
  • Kubernetes,
  • CI/CD
Publication Date
Summer May, 2022
Location
Virtual
Citation Information
Nicholas Pecka, Lotfi Ben Othmane and Altaz Valani. "Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment" International Conference on Software and System Processes (2022)
Available at: http://works.bepress.com/lotfi-benothmane/17/
Creative Commons License
Creative Commons License
This work is licensed under a Creative Commons CC_BY-NC-SA International License.