├── .github └── ISSUE_TEMPLATE │ └── feedback-on-peach-framework.md ├── LICENSE.md ├── README.md ├── assets ├── attack-sequence.png ├── chaosdb.png ├── peaches.png ├── review-process.png └── test ├── case-studies └── chaosdb.md ├── examples └── interface-examples.md └── specifications ├── hardening-factors.md └── security-boundaries.md /.github/ISSUE_TEMPLATE/feedback-on-peach-framework.md: -------------------------------------------------------------------------------- 1 | --- 2 | name: Feedback on PEACH framework 3 | about: Use this to share feedback about PEACH 4 | title: '' 5 | labels: '' 6 | assignees: '' 7 | 8 | --- 9 | 10 | ------- 11 | If Wiz receives any feedback (e.g., questions, comments, suggestions, contributions or the like, whether orally or in writing) regarding this research (collectively, “Feedback”), you hereby grant Wiz a worldwide, sublicensable, transferrable, perpetual, irrevocable, royalty-free license to use, disclose, reproduce, license, or otherwise distribute and exploit the Feedback without obligation or restriction of any kind on account of intellectual property rights or otherwise, and without the obligation to provide any credit. It is further understood that use of Feedback, if any, may be made by Wiz at its sole discretion". 12 | -------------------------------------------------------------------------------- /LICENSE.md: -------------------------------------------------------------------------------- 1 | # Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International 2 | 3 | Creative Commons Corporation (“Creative Commons”) is not a law firm and does not provide legal services or legal advice. Distribution of Creative Commons public licenses does not create a lawyer-client or other relationship. Creative Commons makes its licenses and related information available on an “as-is” basis. Creative Commons gives no warranties regarding its licenses, any material licensed under their terms and conditions, or any related information. Creative Commons disclaims all liability for damages resulting from their use to the fullest extent possible. 4 | 5 | **Using Creative Commons Public Licenses** 6 | 7 | Creative Commons public licenses provide a standard set of terms and conditions that creators and other rights holders may use to share original works of authorship and other material subject to copyright and certain other rights specified in the public license below. The following considerations are for informational purposes only, are not exhaustive, and do not form part of our licenses. 8 | 9 | * __Considerations for licensors:__ Our public licenses are intended for use by those authorized to give the public permission to use material in ways otherwise restricted by copyright and certain other rights. Our licenses are irrevocable. Licensors should read and understand the terms and conditions of the license they choose before applying it. Licensors should also secure all rights necessary before applying our licenses so that the public can reuse the material as expected. Licensors should clearly mark any material not subject to the license. This includes other CC-licensed material, or material used under an exception or limitation to copyright. [More considerations for licensors](http://wiki.creativecommons.org/Considerations_for_licensors_and_licensees#Considerations_for_licensors). 10 | 11 | * __Considerations for the public:__ By using one of our public licenses, a licensor grants the public permission to use the licensed material under specified terms and conditions. If the licensor’s permission is not necessary for any reason–for example, because of any applicable exception or limitation to copyright–then that use is not regulated by the license. Our licenses grant only permissions under copyright and certain other rights that a licensor has authority to grant. Use of the licensed material may still be restricted for other reasons, including because others have copyright or other rights in the material. A licensor may make special requests, such as asking that all changes be marked or described. Although not required by our licenses, you are encouraged to respect those requests where reasonable. [More considerations for the public](http://wiki.creativecommons.org/Considerations_for_licensors_and_licensees#Considerations_for_licensees). 12 | 13 | ## Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License 14 | 15 | By exercising the Licensed Rights (defined below), You accept and agree to be bound by the terms and conditions of this Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License ("Public License"). To the extent this Public License may be interpreted as a contract, You are granted the Licensed Rights in consideration of Your acceptance of these terms and conditions, and the Licensor grants You such rights in consideration of benefits the Licensor receives from making the Licensed Material available under these terms and conditions. 16 | 17 | ### Section 1 – Definitions. 18 | 19 | a. __Adapted Material__ means material subject to Copyright and Similar Rights that is derived from or based upon the Licensed Material and in which the Licensed Material is translated, altered, arranged, transformed, or otherwise modified in a manner requiring permission under the Copyright and Similar Rights held by the Licensor. For purposes of this Public License, where the Licensed Material is a musical work, performance, or sound recording, Adapted Material is always produced where the Licensed Material is synched in timed relation with a moving image. 20 | 21 | b. __Copyright and Similar Rights__ means copyright and/or similar rights closely related to copyright including, without limitation, performance, broadcast, sound recording, and Sui Generis Database Rights, without regard to how the rights are labeled or categorized. For purposes of this Public License, the rights specified in Section 2(b)(1)-(2) are not Copyright and Similar Rights. 22 | 23 | e. __Effective Technological Measures__ means those measures that, in the absence of proper authority, may not be circumvented under laws fulfilling obligations under Article 11 of the WIPO Copyright Treaty adopted on December 20, 1996, and/or similar international agreements. 24 | 25 | f. __Exceptions and Limitations__ means fair use, fair dealing, and/or any other exception or limitation to Copyright and Similar Rights that applies to Your use of the Licensed Material. 26 | 27 | h. __Licensed Material__ means the artistic or literary work, database, or other material to which the Licensor applied this Public License. 28 | 29 | i. __Licensed Rights__ means the rights granted to You subject to the terms and conditions of this Public License, which are limited to all Copyright and Similar Rights that apply to Your use of the Licensed Material and that the Licensor has authority to license. 30 | 31 | h. __Licensor__ means the individual(s) or entity(ies) granting rights under this Public License. 32 | 33 | i. __NonCommercial__ means not primarily intended for or directed towards commercial advantage or monetary compensation. For purposes of this Public License, the exchange of the Licensed Material for other material subject to Copyright and Similar Rights by digital file-sharing or similar means is NonCommercial provided there is no payment of monetary compensation in connection with the exchange. 34 | 35 | j. __Share__ means to provide material to the public by any means or process that requires permission under the Licensed Rights, such as reproduction, public display, public performance, distribution, dissemination, communication, or importation, and to make material available to the public including in ways that members of the public may access the material from a place and at a time individually chosen by them. 36 | 37 | k. __Sui Generis Database Rights__ means rights other than copyright resulting from Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases, as amended and/or succeeded, as well as other essentially equivalent rights anywhere in the world. 38 | 39 | l. __You__ means the individual or entity exercising the Licensed Rights under this Public License. __Your__ has a corresponding meaning. 40 | 41 | ### Section 2 – Scope. 42 | 43 | a. ___License grant.___ 44 | 45 | 1. Subject to the terms and conditions of this Public License, the Licensor hereby grants You a worldwide, royalty-free, non-sublicensable, non-exclusive, irrevocable license to exercise the Licensed Rights in the Licensed Material to: 46 | 47 | A. reproduce and Share the Licensed Material, in whole or in part, for NonCommercial purposes only; and 48 | 49 | B. produce and reproduce, but not Share, Adapted Material for NonCommercial purposes only. 50 | 51 | 2. __Exceptions and Limitations.__ For the avoidance of doubt, where Exceptions and Limitations apply to Your use, this Public License does not apply, and You do not need to comply with its terms and conditions. 52 | 53 | 3. __Term.__ The term of this Public License is specified in Section 6(a). 54 | 55 | 4. __Media and formats; technical modifications allowed.__ The Licensor authorizes You to exercise the Licensed Rights in all media and formats whether now known or hereafter created, and to make technical modifications necessary to do so. The Licensor waives and/or agrees not to assert any right or authority to forbid You from making technical modifications necessary to exercise the Licensed Rights, including technical modifications necessary to circumvent Effective Technological Measures. For purposes of this Public License, simply making modifications authorized by this Section 2(a)(4) never produces Adapted Material. 56 | 57 | 5. __Downstream recipients.__ 58 | 59 | A. __Offer from the Licensor – Licensed Material.__ Every recipient of the Licensed Material automatically receives an offer from the Licensor to exercise the Licensed Rights under the terms and conditions of this Public License. 60 | 61 | B. __No downstream restrictions.__ You may not offer or impose any additional or different terms or conditions on, or apply any Effective Technological Measures to, the Licensed Material if doing so restricts exercise of the Licensed Rights by any recipient of the Licensed Material. 62 | 63 | 6. __No endorsement.__ Nothing in this Public License constitutes or may be construed as permission to assert or imply that You are, or that Your use of the Licensed Material is, connected with, or sponsored, endorsed, or granted official status by, the Licensor or others designated to receive attribution as provided in Section 3(a)(1)(A)(i). 64 | 65 | b. ___Other rights.___ 66 | 67 | 1. Moral rights, such as the right of integrity, are not licensed under this Public License, nor are publicity, privacy, and/or other similar personality rights; however, to the extent possible, the Licensor waives and/or agrees not to assert any such rights held by the Licensor to the limited extent necessary to allow You to exercise the Licensed Rights, but not otherwise. 68 | 69 | 2. Patent and trademark rights are not licensed under this Public License. 70 | 71 | 3. To the extent possible, the Licensor waives any right to collect royalties from You for the exercise of the Licensed Rights, whether directly or through a collecting society under any voluntary or waivable statutory or compulsory licensing scheme. In all other cases the Licensor expressly reserves any right to collect such royalties, including when the Licensed Material is used other than for NonCommercial purposes. 72 | 73 | ### Section 3 – License Conditions. 74 | 75 | Your exercise of the Licensed Rights is expressly made subject to the following conditions. 76 | 77 | a. ___Attribution.___ 78 | 79 | 1. If You Share the Licensed Material, You must: 80 | 81 | A. retain the following if it is supplied by the Licensor with the Licensed Material: 82 | 83 | i. identification of the creator(s) of the Licensed Material and any others designated to receive attribution, in any reasonable manner requested by the Licensor (including by pseudonym if designated); 84 | 85 | ii. a copyright notice; 86 | 87 | iii. a notice that refers to this Public License; 88 | 89 | iv. a notice that refers to the disclaimer of warranties; 90 | 91 | v. a URI or hyperlink to the Licensed Material to the extent reasonably practicable; 92 | 93 | B. indicate if You modified the Licensed Material and retain an indication of any previous modifications; and 94 | 95 | C. indicate the Licensed Material is licensed under this Public License, and include the text of, or the URI or hyperlink to, this Public License. 96 | 97 | For the avoidance of doubt, You do not have permission under this Public License to Share Adapted Material. 98 | 99 | 2. You may satisfy the conditions in Section 3(a)(1) in any reasonable manner based on the medium, means, and context in which You Share the Licensed Material. For example, it may be reasonable to satisfy the conditions by providing a URI or hyperlink to a resource that includes the required information. 100 | 101 | 3. If requested by the Licensor, You must remove any of the information required by Section 3(a)(1)(A) to the extent reasonably practicable. 102 | 103 | ### Section 4 – Sui Generis Database Rights. 104 | 105 | Where the Licensed Rights include Sui Generis Database Rights that apply to Your use of the Licensed Material: 106 | 107 | a. for the avoidance of doubt, Section 2(a)(1) grants You the right to extract, reuse, reproduce, and Share all or a substantial portion of the contents of the database for NonCommercial purposes only and provided You do not Share Adapted Material; 108 | 109 | b. if You include all or a substantial portion of the database contents in a database in which You have Sui Generis Database Rights, then the database in which You have Sui Generis Database Rights (but not its individual contents) is Adapted Material; and 110 | 111 | c. You must comply with the conditions in Section 3(a) if You Share all or a substantial portion of the contents of the database. 112 | 113 | For the avoidance of doubt, this Section 4 supplements and does not replace Your obligations under this Public License where the Licensed Rights include other Copyright and Similar Rights. 114 | 115 | ### Section 5 – Disclaimer of Warranties and Limitation of Liability. 116 | 117 | a. __Unless otherwise separately undertaken by the Licensor, to the extent possible, the Licensor offers the Licensed Material as-is and as-available, and makes no representations or warranties of any kind concerning the Licensed Material, whether express, implied, statutory, or other. This includes, without limitation, warranties of title, merchantability, fitness for a particular purpose, non-infringement, absence of latent or other defects, accuracy, or the presence or absence of errors, whether or not known or discoverable. Where disclaimers of warranties are not allowed in full or in part, this disclaimer may not apply to You.__ 118 | 119 | b. __To the extent possible, in no event will the Licensor be liable to You on any legal theory (including, without limitation, negligence) or otherwise for any direct, special, indirect, incidental, consequential, punitive, exemplary, or other losses, costs, expenses, or damages arising out of this Public License or use of the Licensed Material, even if the Licensor has been advised of the possibility of such losses, costs, expenses, or damages. Where a limitation of liability is not allowed in full or in part, this limitation may not apply to You.__ 120 | 121 | c. The disclaimer of warranties and limitation of liability provided above shall be interpreted in a manner that, to the extent possible, most closely approximates an absolute disclaimer and waiver of all liability. 122 | 123 | ### Section 6 – Term and Termination. 124 | 125 | a. This Public License applies for the term of the Copyright and Similar Rights licensed here. However, if You fail to comply with this Public License, then Your rights under this Public License terminate automatically. 126 | 127 | b. Where Your right to use the Licensed Material has terminated under Section 6(a), it reinstates: 128 | 129 | 1. automatically as of the date the violation is cured, provided it is cured within 30 days of Your discovery of the violation; or 130 | 131 | 2. upon express reinstatement by the Licensor. 132 | 133 | For the avoidance of doubt, this Section 6(b) does not affect any right the Licensor may have to seek remedies for Your violations of this Public License. 134 | 135 | c. For the avoidance of doubt, the Licensor may also offer the Licensed Material under separate terms or conditions or stop distributing the Licensed Material at any time; however, doing so will not terminate this Public License. 136 | 137 | d. Sections 1, 5, 6, 7, and 8 survive termination of this Public License. 138 | 139 | ### Section 7 – Other Terms and Conditions. 140 | 141 | a. The Licensor shall not be bound by any additional or different terms or conditions communicated by You unless expressly agreed. 142 | 143 | b. Any arrangements, understandings, or agreements regarding the Licensed Material not stated herein are separate from and independent of the terms and conditions of this Public License. 144 | 145 | ### Section 8 – Interpretation. 146 | 147 | a. For the avoidance of doubt, this Public License does not, and shall not be interpreted to, reduce, limit, restrict, or impose conditions on any use of the Licensed Material that could lawfully be made without permission under this Public License. 148 | 149 | b. To the extent possible, if any provision of this Public License is deemed unenforceable, it shall be automatically reformed to the minimum extent necessary to make it enforceable. If the provision cannot be reformed, it shall be severed from this Public License without affecting the enforceability of the remaining terms and conditions. 150 | 151 | c. No term or condition of this Public License will be waived and no failure to comply consented to unless expressly agreed to by the Licensor. 152 | 153 | d. Nothing in this Public License constitutes or may be interpreted as a limitation upon, or waiver of, any privileges and immunities that apply to the Licensor or You, including from the legal processes of any jurisdiction or authority. 154 | 155 | > Creative Commons is not a party to its public licenses. Notwithstanding, Creative Commons may elect to apply one of its public licenses to material it publishes and in those instances will be considered the “Licensor.” Except for the limited purpose of indicating that material is shared under a Creative Commons public license or as otherwise permitted by the Creative Commons policies published at [creativecommons.org/policies](http://creativecommons.org/policies), Creative Commons does not authorize the use of the trademark “Creative Commons” or any other trademark or logo of Creative Commons without its prior written consent including, without limitation, in connection with any unauthorized modifications to any of its public licenses or any other arrangements, understandings, or agreements concerning use of licensed material. For the avoidance of doubt, this paragraph does not form part of the public licenses. 156 | > 157 | > Creative Commons may be contacted at [creativecommons.org](http://creativecommons.org). 158 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 |
Typical vulnerability-enabled cross-tenant attack sequence
9 | 10 | Although these issues have been reported on extensively and were dealt with appropriately by the relevant vendors, we’ve seen little public discussion on how to mitigate such vulnerabilities across the entire industry. The vast majority of modern SaaS and PaaS applications are multi-tenant, and anyone building or using these services should have an interest in solving this problem. 11 | 12 | In addition, something that stood out to us about each of these vulnerabilities was their root cause: **improperly implemented security boundaries**, usually compounded by otherwise harmless **bugs in customer-facing interfaces**. 13 | 14 | As time went by, we began noticing a problematic pattern: 15 | 1. There is no **common language** in the industry to talk about best practices for tenant isolation, so each vendor ends up relying on different terminology and implementation standards for their security boundaries, making it difficult to assess their efficacy. 16 | 2. There is no **baseline** for what measures vendors should be expected to take in order to ensure tenant isolation in their products, neither in terms of which boundaries they’re using or how they are actually implemented. 17 | 3. There is no standard for **transparency** – while some vendors are very forthcoming about the details of their security boundaries, others share very little about them. This makes it harder for customers to manage the risks of using cloud applications. 18 | 19 | This led us to develop **PEACH**, with the goal of modelling tenant isolation in cloud applications, evaluating security posture, and outlining ways to improve it if necessary - all based on the lessons we've learned in our cloud vulnerability research. 20 | 21 | ### Using PEACH 22 | 23 | The first part of the security review process involves a tenant isolation review (see example [here](/case-studies/chaosdb.md)). This isolation review analyzes the risks associated with customer-facing interfaces and determines: 24 | 1. The **complexity of the interface** as a predictor of vulnerability (see examples [here](/examples/interface-examples.md)); 25 | 2. Whether the interface is **shared or duplicated** per tenant; 26 | 3. What type of **security boundaries** are in place (e.g. hardware virtualization - see other types [here](/specifications/security-boundaries.md)); 27 | 4. How strongly these boundaries have been **implemented**. 28 | 29 | In order to gauge how strongly the security boundaries have been implemented (4), we propose using the following five parameters (P.E.A.C.H. - defined in detail [here](/specifications/hardening-factors.md)): 30 | 1. **P**rivilege hardening 31 | 2. **E**ncryption hardening 32 | 3. **A**uthentication hardening 33 | 4. **C**onnectivity hardening 34 | 5. **H**ygiene 35 | 36 | The second part of the security review process consists of remediation steps to manage the risk of cross-tenant vulnerabilities and improve isolation as necessary. These includes reducing interface complexity, enhancing tenant separation, and increasing interface duplication, all while accounting for operational context such as budget constraints, compliance requirements, and expected use-case characteristics of the service. 37 | 38 |Isolation design review procedure
40 | 41 | ### Getting started with PEACH 42 | 43 | To find out more about the PEACH framework, check out the [PEACH website](https://peach.wiz.io) you to learn about principles for designing cloud applications with strong tenant isolation, and modelling your services against the threat of isolation escape. Additionally, you can see which questions to ask vendors to evaluate your security posture considering the risk of cross-tenant vulnerabilities. You may also read [our new whitepaper](https://www.datocms-assets.com/75231/1671033753-peach_whitepaper_ver1-1.pdf), which takes a closer look at the PEACH framework while delving into prior work on the subject of tenant isolation. 44 | 45 | ### Get involved 46 | 47 | We would be thrilled to receive your feedback so we can improve the framework and make it as useful as possible for cloud application developers – feel free to reach out to us directly or [create an issue](https://github.com/wiz-sec/peach-framework/issues/new) here in our GitHub repository. 48 | 49 | You can also contribute to this project by adding content, such as your own [case studies](/case-studies) of using the framework to analyze the isolation scheme of a cloud application or to determine the root cause of a cloud vulnerability. 50 | 51 | ### Acknowledgements 52 | We would like to extend our gratitude to Christophe Parisel (Senior Cloud Security Architect, Société Générale), Cfir Cohen (Staff Software Engineer, Google), Kat Traxler (Principal Security Researcher, VectraAI), Srinath Kuruvadi (Head of Cloud Security, Netflix), Joseph Kjar (Senior Cloud Security Engineer, Netflix), Mike Kuhn (Managing Principal, Coalfire), Daniel Pittner (Software Architect, IBM Cloud), and Adam Callis (Information Security Architect, Cisco) for sharing constructive input throughout the development of this framework. 53 | 54 | We would also like to thank AWS for their review of our whitepaper and the valuable feedback they provided. We highly appreciate their willingness to help us identify tenant isolation best practices and their commitment to improving security transparency for cloud customers. 55 | 56 | [](https://creativecommons.org/licenses/by-nc-sa/4.0/) 57 | -------------------------------------------------------------------------------- /assets/attack-sequence.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec-public/peach-framework/a6b09b896602c3c49f1842d3b86d5392d01cb2a2/assets/attack-sequence.png -------------------------------------------------------------------------------- /assets/chaosdb.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec-public/peach-framework/a6b09b896602c3c49f1842d3b86d5392d01cb2a2/assets/chaosdb.png -------------------------------------------------------------------------------- /assets/peaches.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec-public/peach-framework/a6b09b896602c3c49f1842d3b86d5392d01cb2a2/assets/peaches.png -------------------------------------------------------------------------------- /assets/review-process.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wiz-sec-public/peach-framework/a6b09b896602c3c49f1842d3b86d5392d01cb2a2/assets/review-process.png -------------------------------------------------------------------------------- /assets/test: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /case-studies/chaosdb.md: -------------------------------------------------------------------------------- 1 | ### Case study – ChaosDB 2 | 3 | [ChaosDB](https://www.wiz.io/blog/chaosdb-explained-azures-cosmos-db-vulnerability-walkthrough) was a cross-tenant vulnerability in Azure Cosmos DB disclosed by Wiz in August 2021. The attack sequence consisted of deploying an embedded Jupyter Notebook, exploiting a local privilege escalation vulnerability, modifying firewall rules to gain unrestricted network access, authenticating to the CosmosDB backend, and abusing this access to retrieve and decrypt other tenants’ credentials. 4 | 5 | By using the PEACH framework to model Cosmos DB’s initial state prior to ChaosDB’s disclosure, we can conduct a root cause analysis of the vulnerability. To the best of our understanding, each tenant’s embedded Jupyter Notebook ran in a container nested within a virtual machine. Although this might appear to be a strong isolation scheme, the interface’s hardening factors revealed critical gaps at the implementation level: 6 | 1. **Privilege** hardening gap – tenant-allocated VM with access to shared admin certificate. 7 | 2. **Encryption** hardening gap – tenant API keys encrypted with shared key. 8 | 3. **Authentication** hardening gap – self-signed certificate not validated. 9 | 4. **Connectivity** hardening gap – network controls only enforced within container (iptables) and orchestrator interface accessible from tenant container. 10 | 5. **Hygiene** gap – tenant access to unrelated certificates and keys. 11 | 12 |Estimated isolation scheme of Cosmos DB-embedded Jupyter Notebook at the time of ChaosDB’s discovery
14 | 15 | While this isolation scheme can ensure tenant isolation for relatively simple interfaces, it is ill-suited to highly complex ones such as Jupyter Notebook. In the case of ChaosDB, this complexity resulted in PEACH gaps that ultimately enabled our attack sequence to unfold. 16 | -------------------------------------------------------------------------------- /examples/interface-examples.md: -------------------------------------------------------------------------------- 1 | | **Interface type** | **Typical input (example)** | **Typical process** | **Complexity level** 2 | |--|--|--|--| 3 | | Arbitrary code execution environment | Arbitrary | Execution | High | 4 | | Database client | SQL query | Database operation | High | 5 | | Arbitrary file scanner | Arbitrary | Parsing | Medium | 6 | | Binary data parsing | Protobuf | Parsing | Medium | 7 | | Web crawler | JavaScript | Rendering | Medium | 8 | | Port scanner | Metadata | Parsing | Low | 9 | | Reverse proxy | Arbitrary | Proxy | Low | 10 | | Queue message upload | Arbitrary | Proxy | Low | 11 | | Data entry form | String | Parsing | Low | 12 | | Bucket file upload | Arbitrary | Storage | Low | 13 | -------------------------------------------------------------------------------- /specifications/hardening-factors.md: -------------------------------------------------------------------------------- 1 | ## Privilege Hardening 2 | 1. Tenants and hosts generally have minimal permissions in the service environment, thereby adhering to the principle of least privilege. 3 | 2. In particular, each tenant is not authorized to read or write to other tenants’ data unless explicitly approved by the tenants involved, and each host does not have read or write access to other hosts. 4 | 3. Privileges are verified prior to execution of operations. 5 | 6 | ## Encryption Hardening 7 | 1. Data owned by and related to each tenant – at-rest and in-transit – is encrypted with a key unique to that tenant, regardless of architecture. 8 | 2. Logs pertaining to each tenant’s activity are encrypted by a secret shared only between the tenant and the control plane . 9 | 10 | ## Authentication Hardening 11 | 1. Communications between each tenant and the control plane (in both directions) use authentication with a key or certificate unique to each tenant. 12 | 2. Authentication keys are validated, and self-signed keys are blocked. 13 | 14 | ## Connectivity Hardening 15 | 1. All inter-host connectivity is blocked by default unless explicitly approved by the tenants involved (so as to facilitate database replication, for example); hosts cannot connect to other hosts in the service environment, except those used by the control plane (i.e., a hub-and-spoke configuration). 16 | 2. Hosts do not accept incoming connection requests from other hosts unless explicitly approved by the tenants involved, except those used by the control plane (in anticipation of scenarios in which an attacker manages to overcome connectivity limitations on their own compromised host). 17 | 3. Tenants cannot arbitrarily access any external resource (both within the service environment and on the Internet) and are limited to communicating with only pre-approved resources or those explicitly approved by the tenant. 18 | 19 | ## Hygiene 20 | Unnecessary data scattered throughout the environment might serve as clues or quick wins for malicious actors, particularly those that have managed to breach one or more security boundaries, which in turn enable further reconnaissance and lateral movement. Therefore, vendors can eliminate the following types of data at the design level and also regularly scan for forgotten artifacts: 21 | 1. Secrets – The interface and datastore (and underlying host, in the case of virtualization or containerization) do not contain any keys or credentials that would allow authentication to other tenants’ environments or decryption of other tenants’ backend communications or logs. 22 | 2. Software – The instance and datastore (and underlying host) do not contain any built-in software or source code that could enable reconnaissance or lateral movement. 23 | 3. Logs – Each tenant’s logs are hidden from and inaccessible by other tenants; logs accessible to each tenant do not contain any information pertaining to other tenants’ activity. 24 | -------------------------------------------------------------------------------- /specifications/security-boundaries.md: -------------------------------------------------------------------------------- 1 | # Primary Boundaries 2 | 3 | ## Hardware Separation 4 | Wherein instances belonging to different tenants run on separate physical machines (IaaS such as bare-metal servers or dedicated physical datacenters). This is the highest practical level of isolation but is not considered cost-effective at scale, nor is the added level of isolation significant in comparison to the use of industry-vetted hardware virtualization (this becomes especially apparent in cases where hardware separation has been insufficiently hardened). 5 | 6 | ## Hardware Virtualization 7 | Wherein instances belonging to different tenants run in separate virtual machines running on shared hardware. This is generally considered a high level of isolation. 8 | 9 | ## Containerization 10 | Wherein instances belonging to different tenants run in separate containers running on shared hardware (or nested within a shared virtual machine) via operating-system-level virtualization. Containers are not considered an especially effective security boundary on their own, and therefore this should generally be treated as a low level of isolation. 11 | 12 | When using containerization as a security boundary, vendors should enforce permission restrictions on deployed workloads , via technologies such as SECCOMP , AppArmor and gVisor , thereby limiting the capacity of a compromised container from affecting its host. Additional mitigations may include implementing a read-only filesystem, limiting the privileges of user accounts, disabling the root user, and minimizing the number of running highly privileged processes. Moreover, vendors should generally prefer the use of hardened operating systems. 13 | 14 | ## Data Segmentation 15 | Wherein data belonging to different tenants is stored and/or processed on a shared storage component (virtual or physical), but unique keys are used to encrypt and/or authorize access to each tenant’s data. This is generally considered a low level of isolation, as it’s highly dependent on the implementation of other aspects of the architecture (such as key storage security). 16 | 17 | # Secondary Boundaries 18 | 19 | ## Network Segmentation 20 | Wherein instances belonging to different tenants run on separate machines (virtual or physical) in the same network, which is segmented into single tenant VPNs or subnets (logically separated via encapsulation, encryption, and firewalling). This is generally considered a high level of isolation. 21 | 22 | ## Identity Segmentation 23 | Wherein roles are assigned to different tenants (whether or not customers can access them directly under normal circumstances) which are limited by deny-by-default policies, such that each tenant cannot perform any actions affecting resources belonging to any other tenant . This is generally considered a high level of isolation. 24 | --------------------------------------------------------------------------------