Closed jwz16 closed 1 year ago
Some of my naive thoughts when I cannot sleep at night:
Since the data flow is:
[ External ] <--> [ Yarn/Spark APIs/UIs ] <--> [ Yarn Master ] <--> [ Yarn NodeManager ] <--> [ Container (Regular/Kata) ] <--> [Data Storage ]
Then, the potential security tests can be launched at the following points:
[ User ] --> [ Yarn Master ] --> [ Yarn NodeManager ] --> [ Container ] --> [ Spark Executor/Driver ] --> [ Data ] | | | | (Access Control) (Isolation Test) (Network Test) (Resource Test)
And for each attack/test, we could think as:
[ External Attacker ] --\ \ [ Malicious Internal User ] --> [ Yarn/Spark APIs/UIs ] / [ Compromised Container ] --/
Done with brief documentation in security level comparison between regular container and kata-container and in the context of Yarn + Spark.
Some of my naive thoughts when I cannot sleep at night:
Since the data flow is:
Then, the potential security tests can be launched at the following points:
And for each attack/test, we could think as: