-
Notifications
You must be signed in to change notification settings - Fork 14
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
143 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -16,7 +16,7 @@ The Applications RP component is responsible for managing applications and their | |
| UCP | Universal Control Plane for Radius | | ||
## System Description | ||
|
||
Applications RP is a Radius service that acts as resource provider for application and its resources. It communicates over HTTP. The RP has a Datastore for storing Radius data, Message Queue for processing asynchronous request and a Secret Store for storing sensitive information such as certficates. All these are configurable components and support multiple implementations. Users and Clients cannot directly communicate with Applications RP. They instead communicate with UCP. UCP forwards relevant requests to Applications RP. Applications may have Kubernetes resources and cloud resources. Applications RP manages these Kubernetes resources on the user's behalf. This may launch user application's code on the same cluster as Radius, or a different cluster. it also has access to user's cloud credentials and manages user's cloud resources. Applications RP can invoke *recipes* which are bicep or terraform code. These recipes are used to deploy application infrastructure components like databases. | ||
Applications RP is a Radius component that acts as resource provider for application and its resources. It communicates over HTTP. The RP has a Datastore for storing Radius data, Message Queue for processing asynchronous request and a Secret Store for storing sensitive information such as certficates. All these are configurable components and support multiple implementations. Users and Clients cannot directly communicate with Applications RP. They instead communicate with UCP. UCP forwards relevant requests to Applications RP. Applications may have Kubernetes resources and cloud resources. Applications RP manages these Kubernetes resources on the user's behalf. This may launch user application's code on the same cluster as Radius, or a different cluster. it also has access to user's cloud credentials and manages user's cloud resources. Applications RP can invoke *recipes* which are bicep or terraform code. These recipes are used to deploy application infrastructure components like databases. | ||
|
||
### Architecture | ||
|
||
|
@@ -48,42 +48,181 @@ Below is a high level overview of various key subcomponents in Applications RP | |
#### Use of Cryptography | ||
|
||
|
||
1. **Computing the Hash for Terraform Backend Configuration**: [Link to code](https://github.com/radius-project/radius/blob/main/pkg/recipes/terraform/config/backends/kubernetes.go#L110). | ||
|
||
1. **Purpose**: The purpose of computing the hash is to compute a key for kubernetes secret which has the etrraform backend config | ||
2. **Library**: The library used to calculate the hash of the deployment configuration is the crypto library, which is one of the standard libraries of Go: [Link to library](https://pkg.go.dev/[email protected]). | ||
3. **Type**: [SHA1](https://www.rfc-editor.org/rfc/rfc3174.html). Note: "SHA-1 is cryptographically broken and should not be used for secure applications." [Link to warning](https://pkg.go.dev/crypto/[email protected]). This is used as an optimization for detecting changes, not as a security protection. | ||
|
||
2. Applications RP also uses UCP's queue and store libraries. These libraries use Cryptography and are detailed in UCP threat model. [link to be added] | ||
|
||
#### Storage of secrets | ||
|
||
Applications RP has access to sensitive information related to the application resource it manages as well as the cloud credentials it requires for managing cloud resources on Azure and AWS. Applications RP provides a Secret Store which can be used to store sentive information such as TLS certificate and private keys. It uses kubernetes secrets to implement this secret store. | ||
|
||
|
||
##### Managing secrets for datastores | ||
|
||
Applications RP service has a Datastore RP. This RP is the resource provider for datstores such as SQL database, Mongo DB and Redis Cache. As of today, sensitive information such as DB connection string, user/ password that is required to provision these resources is stored in plain text (is this true for datastore recipe too). The feature which enables datastores to use a secret store is in progress. | ||
|
||
#### Access to cloud credentials | ||
##### Access to cloud credentials and cloud | ||
|
||
Applications RP requires AWS and Azure credentials for accessing and managing resources in cloud. It fetches credentials using UCP Secret Provider library. | ||
Credentials are not available for retrieval through API. Also, RP supports federated identities which enables robust security practices. | ||
|
||
Using these credentials, Applications RP can create other resources in AWS and Azure. The RP also can create managed identities for azure which will decide who can deploy and run user code. | ||
|
||
#### Access to cluster | ||
|
||
The RP can create kubernetes resources and manage them on behalf of the user. It can, for example, create a container based on the image provided by the user, which can in turn execute arbitrary code, and create other resources in the cluster. | ||
|
||
#### Exposing User Application to Internet | ||
|
||
The Radius RP can create ingress Kubernetes objects, which can expose a kubernetes service to internet. | ||
|
||
#### Bicep Recipe execution | ||
|
||
`Recipes` are arbitrary Bicep or Terraform code which can provision infrastructure resources. In order to exceute a Bicep recipe, Applications RP's Recipe Engine first downloads the recipe from a OCI compliant registry over HTTP. Then it requests UCP to deploy the bicep. | ||
|
||
#### Terraform Recipe execution | ||
|
||
Terraform recipes are download from internet too, since they are available as public modules. These recipes are downloaded onto an empty directory `/terraform` which is mounted into the applications RP pod. Then the installed terraform executable executes these recipes in the current directory. Terraform communicates with AWS and Azure as needed to deploy resources. | ||
|
||
|
||
#### Data Serialization / Formats | ||
|
||
We use custom parsers to parse Radius-related resource IDs and do not use any other custom parsers and instead rely on Kubernetes built-in parsers. Therefore, we trust Kubernetes security measures to handle data serialization and formats securely. The custom parser that parses Radius resource IDs has its own security mechanisms that don't accept anything other than a Radius resource ID. | ||
|
||
We also use json for data interchange between Applications RP and other services. We use golang standard libraries to parse json. | ||
|
||
## Clients | ||
|
||
**UCP** UCP is the client of Applications RP. It forwards all requests related to Applications and several of Application resources deployment to Applications RP. | ||
|
||
## Trust Boundaries | ||
|
||
We have a few different trust boundaries for the Controller component: | ||
|
||
## Trust Boundaries | ||
- **Kubernetes Cluster**: The overall environment where the Applications RP operates and receives requests from the UCP. | ||
- **Namespaces within the Cluster**: Logical partitions within the cluster to separate and isolate resources and workloads. | ||
|
||
The Applications RP component lives inside the `radius-system` namespace in the Kubernetes cluster where it is installed. UCPD also resides within the same namespace. | ||
|
||
The Kubernetes API Server, with which Applications RP interacts, runs in the `kube-system` namespace within the cluster. | ||
|
||
Applications RP deploys each Application and its resources in its own namespace. | ||
|
||
## Assumptions | ||
|
||
This threat model assumes that: | ||
|
||
1. The Radius installation is not tampered with. | ||
2. The Kubernetes cluster that Radius is installed on is not compromised. | ||
3. It is the responsibility of the Kubernetes cluster to authenticate users. Administrators and users with sufficient privileges can perform their required tasks. Radius cannot prevent actions taken by an administrator. | ||
4. Radius stores and queues used by Applicatioßns RP are not compromised. | ||
|
||
|
||
## Data Flow | ||
|
||
![Applications RP via Microsoft Threat Modeling Tool](2024-10-applications-rp-threat-model/apprp-dataflow.png) | ||
|
||
Below are the key points associated with data flow: | ||
1. Applications RP receives request to dpeloy resources from UCP and sends back appropriate response. | ||
2. Applications RP requests UCP to deploy bicep recipes. | ||
3. Application RP (terraform provider) requests AWS/ Azure to deploy resources for terraform recipes. | ||
4. Application RP uses API server to save Radius resources and Async Operations ( API Server is used as datastore and Queue). | ||
5. Application RP fetches recipes from OCI registries and public terraform modules. | ||
|
||
## Threats | ||
|
||
#### Spoofing Applications RP could cause information disclosure, DDoS and misuse of cloud resources. | ||
|
||
**Description:** If a malicious actor can spoof Applications RP, requests from UCP to be sent to the malicious actor. The malicious actor can also send requests to UCP such as fetching credentials. | ||
|
||
**Impact:** All data sent from UCP to Applications RP will be available to the malicious actor, such as payloads of resources. Applications RP would also be able to retreive credentials through UCP and make it available to malicious actor. The credentials can be used to misuse Az/ AWS resources. It might also request controller to update Environment recipes to use an outdated/ vulnerable version of the resource. | ||
|
||
**Mitigations:** | ||
|
||
Spoofing Applications RP, tampering with the applications rp code and configuration would require access to modify the `radius-system` namespace. Our threat model assumes that the operator has limited access to the `radius-system` namespace using Kubernetes' existing RBAC mechanism. | ||
|
||
**Status:** All mitigations listed are currently active. Operators are expected to secure their cluster and limit access to the `radius-system` namespace. | ||
|
||
#### Malicious user can make arbitrary requests to Applications RP API. | ||
|
||
**Impact** | ||
|
||
This can cause a load of various Radius services and result in DDoS. | ||
|
||
**Mitigation** | ||
|
||
Radius currently does not support RBAC. Once we have that, we should restrict Radius API access to only Radius users/ admins. | ||
|
||
**Status** | ||
|
||
Pending | ||
|
||
#### Sniffing the communication between Applications RP and Kubernetes API Server / UCP could cause information disclosure | ||
|
||
**Description:** | ||
If a malicious actor could sniff communication between the applications RP and the Kubernetes API Server Or UCP, the actor could replay the packets and cause a DDoS. | ||
|
||
**Impact:** | ||
A malicious actor could use the information about the resources and operations in progress. They can also replay the same requests to cause a DDoS. | ||
|
||
**Mitigations** | ||
|
||
1. Tampering with Application RP code/ configs would require access to modify the `radius-system` namespace. Our threat model assumes that the operator has limited access to the `radius-system` namespace using Kubernetes' existing RBAC mechanism. | ||
|
||
**Status:** All mitigations listed are currently active. Operators are expected to secure their cluster and limit access to the `radius-system` namespace. | ||
|
||
|
||
|
||
#### Using vulnerable images in recipes can increase the chances of security attack, leading to compromises on application resources as well as cluster. | ||
|
||
**Description** | ||
A malicious user could become the admin, and configure recipes to download vulnerable images for infrasture resources such as sql db. | ||
|
||
**Impact** | ||
This can facilitate the attackers to exploit vulnerabilities and easily attack applications on the cluster and the cluster itself. | ||
|
||
**Mitigations** | ||
Ability to register recipes should be given to only trusted employees. This in turn requires Radius to support rbac. | ||
|
||
Since each application resource is deployed in application's namespace, we can still use kubernetes rbac to confine what resources can do across namespaces. | ||
|
||
**Status** | ||
Radius rbac support is pending. | ||
|
||
#### Using application definition to deploy malicious containers | ||
|
||
**Description** | ||
Application definitions could create pods from any arbitrary image. This container executes code, and it can potentially lead to mis use of cluster resources. | ||
|
||
**Impact** | ||
These containers can then potentially expose secrets, over consume resources and create several resources , delete important infrasture etc. | ||
|
||
**Mitigations** | ||
Application definition and images and recipes used should be reviewed and confined to trusted employees of the organization. | ||
|
||
**Status** | ||
Active (dependant on user's processes) | ||
|
||
#### Applications RP has the a ability to create managed identities which if misused can lead to Escalation of Privilege | ||
|
||
**Description:** If a malicious actor uses Radius, he could deploy Azure managed identity that could rpovide escalated priviledges to users. | ||
|
||
**Impact:** A malicious actor use this ability to gain inappropriate access to azure resources. | ||
|
||
**Mitigations:** | ||
|
||
1. Only authorized users should be able to deploy applications using Radius. | ||
|
||
**Status:** | ||
|
||
Pending. This mitigation requires rbac support in radius. | ||
|
||
|
||
|
||
|
||
|
||
|
||
## Threats |
Binary file modified
BIN
-646 KB
(26%)
architecture/2024-10-applications-rp-threat-model/apprp-dataflow.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.