{"id":902,"date":"2016-07-22T12:00:52","date_gmt":"2016-07-22T10:00:52","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=902"},"modified":"2023-08-06T21:54:57","modified_gmt":"2023-08-06T19:54:57","slug":"defense-in-depth-a-present-time-example","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/22\/defense-in-depth-a-present-time-example\/","title":{"rendered":"Defense in Depth: a present time example"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg\" alt=\"Dark castle walls reaching in the sky\" width=\"3648\" height=\"2432\">Whenever we talk about multi-layered security, we always get to the see the image of an ancient medieval castle with high walls, moats and towers. In this post, we&nbsp;want to take a more present-time&nbsp;view on the concept of defense&nbsp;in depth. Therefore we are going to examine <a href=\"https:\/\/www.chromium.org\/chromium-os\" target=\"_blank\" rel=\"noopener\">Chrome OS,<\/a> the niche operation system for web users, and its techniques to keep its users save.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=0QRO3gKj3qw\" target=\"_blank\" rel=\"noopener\">Chrome OS<\/a> is basically&nbsp;a vehicle to start a browser on very cheap hardware. This fits the use case of many&nbsp;internet users who use their notebook and operating system mainly to communicate, browse the internet&nbsp; and watch Netflix.<\/p>\n<p>It is built upon the Linux kernel, with the Chrome browser handling most of the &#8220;applications&#8221;. These applications are generally&nbsp;web apps, with the exception of the media player and file explorer.<\/p>\n<p>In contrast&nbsp;to Windows, OS X or even Linux, Chrome OS&nbsp;was designed with one goal in mind (or at least this is the impression you get when you read their <a href=\"https:\/\/www.chromium.org\/chromium-os\/chromiumos-design-docs\" target=\"_blank\" rel=\"noopener\">design documents<\/a>): security.<\/p>\n<h2>Security objectives<\/h2>\n<p>Its security mechanisms are&nbsp;mainly designed to protect against random, optimistic attacks from the internet. This could be either&nbsp;stealing&nbsp;your sensitive data like passwords, or credit card info, or getting permanent access to your device to&nbsp;use it in a botnet.<\/p>\n<p>We are now going to retrace the steps a malicious person would need to perform&nbsp;in order to attack a Chrome OS device. This shows us the layers of defense that are incorporated into&nbsp;the operating system.<\/p>\n<h2>First layer: Browser&nbsp;and&nbsp;attack surface<\/h2>\n<p>The first thing an attacker can use to carry out his evil plans is the browser. Chrome OS uses the&nbsp;Chrome browser (what a surprise). The browser itself uses <a href=\"https:\/\/www.chromium.org\/Home\/chromium-security\/core-principles\" target=\"_blank\" rel=\"noopener\">several mechanisms<\/a> to protect against common attacks, a few of them are explained&nbsp;here:<\/p>\n<h3>Transport security<\/h3>\n<p>Chrome uses <a href=\"https:\/\/www.owasp.org\/index.php\/Certificate_and_Public_Key_Pinning\" target=\"_blank\" rel=\"noopener\">Public Key&nbsp;Pinning<\/a>&nbsp;as one component&nbsp;to prevent man-in-the-middle-attacks on secure connections.<\/p>\n<p>Public Key Pinning mitigates the threat of certificates being issued in someone else&#8217;s name, as happened in <a href=\"https:\/\/security.googleblog.com\/2011\/08\/update-on-attempted-man-in-middle.html\" target=\"_blank\" rel=\"noopener\">2011 with Google and DigiNotar<\/a>. It allows the domain owner to pin certain certificates&nbsp;or certificate authorities as the only legitimate trust anchor&nbsp;for the domain. Any certificate not signed by these pinned certificates would be treated as fraudulent.<\/p>\n<h3>Sandboxing<\/h3>\n<p>All tabs and plugins in Chrome are <a href=\"https:\/\/www.chromium.org\/chromium-os\/developer-guide\/chromium-os-sandboxing\" target=\"_blank\" rel=\"noopener\">sandboxed<\/a> and isolated against each other as well as the file system to prevent malicious websites from snooping sensitive information from other sites you are currently logged on to, or from writing data to&nbsp;the file system.&nbsp;The sandbox in use basically consists of <a href=\"https:\/\/chromium.googlesource.com\/chromium\/src\/+\/master\/docs\/linux_sandboxing.md\" target=\"_blank\" rel=\"noopener\">two layers<\/a>:<\/p>\n<ol>\n<li>The first layer isolates the process running in the sandbox against the system environment. It restricts access to resources like the network interfaces or the file system. Therefore it uses the same Linux kernel features&nbsp;<a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2015\/12\/17\/27\/\" target=\"_blank\" rel=\"noopener\">Docker<\/a> is using to isolate its containers, which is creating an unprivileged user namespace for each process.<\/li>\n<li>The second layer protects the kernel by&nbsp;<a href=\"http:\/\/blog.cr0.org\/2012\/09\/introducing-chromes-next-generation.html\" target=\"_blank\" rel=\"noopener\">filtering system calls<\/a>. This prevents the sandboxed process from running any commands that could be harmful to the system.<\/li>\n<\/ol>\n<p>If you want to check which type of sandbox is active on your system, type the following command in the URL-bar of Chrome:<\/p>\n<pre class=\"prettyprint lang-text\" data-start-line=\"1\" data-visibility=\"visible\" data-highlight=\"\" data-caption=\"\">chrome:\/\/sandbox\/<\/pre>\n<p>Similar to the two layered sandbox architecture, the implementation of Chrome itself uses <a href=\"https:\/\/www.chromium.org\/developers\/design-documents\/multi-process-architecture\" target=\"_blank\" rel=\"noopener\">two layers<\/a>&nbsp;to incorporate the sandbox into the browser:<\/p>\n<ol>\n<li>The render layer displays the website the user has requested. Because it is interpreting untrustworthy code, this is the sandboxed layer. For each tab a new isolated renderer is created. It&nbsp;uses methods provided by the kernel layer for interprocess communication, file system access or memory usage.<\/li>\n<li>The kernel layer is handling all the management work. It provides an interface for communicating between render-processes, restricted access to the file system, resource management and memory management. Because the render-process only has&nbsp;access to the methods provided by the kernel, all actions can be monitored and secured.<\/li>\n<\/ol>\n<h3>Reducing the attack surface<\/h3>\n<p>With the deactivation of the <a href=\"https:\/\/www.chromium.org\/developers\/npapi-deprecation\" target=\"_blank\" rel=\"noopener\">NPAPI<\/a> the Chrome developers tried&nbsp;to reduce the attack surface by shutting down old error-prone interfaces.<\/p>\n<p>But still, there are zero-day exploits and browser weaknesses we don&#8217;t know about yet. So let&#8217;s assume, our attacker has managed to execute malicious code in the browser. Now its time for him to get permanent access to your device.<\/p>\n<h2>Second layer: File System access<\/h2>\n<p>The first thing an attacker has to do in order to get permanent access to a device is saving&nbsp;something somewhere which then can be used later. Therefore he needs&nbsp;write&nbsp;permissions&nbsp;on&nbsp;the file system.<\/p>\n<p>The home directory of the user seems like a good place to start looking for them. Unfortunately for the attacker, this directory is mounted with the&nbsp;<a href=\"https:\/\/www.chromium.org\/chromium-os\/chromiumos-design-docs\/system-hardening#Phase_1_026564505184363374_762\" target=\"_blank\" rel=\"noopener\">noexec<\/a>&nbsp;(also&nbsp;<a href=\"http:\/\/linux.die.net\/man\/8\/mount\" target=\"_blank\" rel=\"noopener\">nosuid<\/a> and <a href=\"http:\/\/linux.die.net\/man\/8\/mount\" target=\"_blank\" rel=\"noopener\">nodev<\/a>) flags by Chrome OS.&nbsp;The attacker can only save data&nbsp;there without any chance of&nbsp;executing&nbsp;them.<\/p>\n<p>The next plausible place to look would be the root partition . Chrome OS even has <a href=\"https:\/\/www.chromium.org\/chromium-os\/chromiumos-design-docs\/filesystem-autoupdate\" target=\"_blank\" rel=\"noopener\">two of them<\/a>. One of them is used as the actual root partition, from where Chrome OS is operating, the other one is used for&nbsp;<a href=\"https:\/\/www.chromium.org\/chromium-os\/chromiumos-design-docs\/filesystem-autoupdate\" target=\"_blank\" rel=\"noopener\">auto-updating<\/a> and fail-safe.&nbsp;There are several mechanisms hindering an attacker from writing to the root partition:<\/p>\n<ul>\n<li>Chrome OS uses Linux user permissions&nbsp;to restrict&nbsp;an ordinary user from writing to system critical files or directories. Even daemon users are heavily locked up. Access to the root directories is permitted only to the root user. This implements the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Principle_of_least_privilege\" target=\"_blank\" rel=\"noopener\">principle of least privilege<\/a>.<\/li>\n<li>Even the permissions of the almighty root user (UID=0) are modified and restricted. With the introduction of <a href=\"http:\/\/man7.org\/linux\/man-pages\/man7\/capabilities.7.html\" target=\"_blank\" rel=\"noopener\">capabilities<\/a>,&nbsp;features that previously required the root user can now be run with a less privileged one reducing the chance of the root user being attacked.<\/li>\n<li>While the operating system is running, the root partition in use is mounted read-only. So even if an attacker compromised the root user, he wouldn&#8217;t be able to persist his attack on the root partition.<\/li>\n<\/ul>\n<p>But there are still bugs in the Linux-kernel an attacker can use to execute code. So let&#8217;s assume now he gained&nbsp;access to our system and written his code somewhere permanently. It&#8217;s time for him to survive a reboot.<\/p>\n<h2>Third layer: Verified&nbsp;boot<\/h2>\n<p>The&nbsp;<a href=\"https:\/\/www.coreboot.org\/Welcome_to_coreboot\" target=\"_blank\" rel=\"noopener\">verified boot<\/a> process is the last line of defense in Chrome OS. It ensures&nbsp;the integrity of the boot loader, the kernel and the file system.&nbsp;Leading to only executing signed and verified code as a consequence.<\/p>\n<h3>Bottom-up security<\/h3>\n<p>To guarantee&nbsp;the integrity of the firmware, the boot loader, the kernel and higher systems, every single piece of software has to be verified to make sure that the following&nbsp;stage can be executed safely.<\/p>\n<p>The <a href=\"https:\/\/docs.google.com\/presentation\/d\/14haBMrbpc2zlgdWmiaTlp_iDG_A8t5PTTXFMz5kqHSM\/present?slide=id.g3891f5dfb_0103\" target=\"_blank\" rel=\"noopener\">root of trust<\/a> for this entire procedure is a small boot stub. This little piece of C-code&nbsp;is baked into a read-only chip together with a public key. Because it is stored read-only it is impossible to change&nbsp;or&nbsp;bypass this step.&nbsp;With the public key the writable firmware can be verified. The firmware then verifies the integrity of the kernel, which then verifies the root file system.<\/p>\n<p>The entire security of this verified boot process is based&nbsp;on the confidentiality of the private key that matches the read-only public key. Hopefully Google is aware of this responsibility. A disclosure of the key would render all existing Chrome OS devices vulnerable to attacks.<\/p>\n<h3>Resilience<\/h3>\n<p>If an attacker has altered data of firmware or the operating system, the verification of this stage fails. Chrome OS then has two&nbsp;options to cure itself from the infected partitions:<\/p>\n<ol>\n<li>If the attacker has infected the root file system it&nbsp;tries to boot the second root partition. Hopefully the attacker has only managed to infect&nbsp;one of the two. If the second partition is clean, the system&nbsp;can boot it and swipe the first one with a clean image of the current system.<\/li>\n<li>If this fails, the boot stub&nbsp;starts a <a href=\"https:\/\/docs.google.com\/presentation\/d\/14haBMrbpc2zlgdWmiaTlp_iDG_A8t5PTTXFMz5kqHSM\/present?slide=id.g183e9a2f4_069\" target=\"_blank\" rel=\"noopener\">restore routine<\/a> also stored on the read-only chip. It instructs the user to load a safe copy of Chrome OS on a USB-Stick from another (hopefully save) device and insert the stick into&nbsp;his&nbsp;device. It loads a <a href=\"https:\/\/docs.google.com\/presentation\/d\/14haBMrbpc2zlgdWmiaTlp_iDG_A8t5PTTXFMz5kqHSM\/present?slide=id.g3891f5dfb_0103\" target=\"_blank\" rel=\"noopener\">trusted USB stack<\/a> which can be used to boot&nbsp;from the recovery&nbsp;stick and overwrite the infected partitions.<\/li>\n<\/ol>\n<p>In either way the verified boot process ensures that an infected operating system is never loaded. This thwarts&nbsp;common attacks&nbsp;like Keyloggers. Those would be installed as driver in the kernel but the device would never execute them.<\/p>\n<h2>The concept of defense in depth<\/h2>\n<p>In this post we took a very sketchy look at the different security mechanisms of Chrome OS, from sandboxing in the browser to verified boot in the firmware. Stepping into the shoes of an attacker we came to see&nbsp;that no security system is perfect. Defense in depth takes this into account. The Google developers designed several layers of defense into the operating system. These layers are designed to add redundancy,&nbsp;narrow down the attack surface, mitigate the effects of a successful attack, or cure the system after an infection. This increases the overall security for the user.<\/p>\n<h2>Further Questions<\/h2>\n<p>This post was focused on the technical security aspects of Chrome OS. But there are some other questions that come to mind when talking about this operating system:<\/p>\n<ul>\n<li>Stolen user accounts or botnets&nbsp;are available in the D<a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/11\/incognito-in-the-dark-web-a-guide\/\">arknet<\/a>&nbsp;for everyone. Plus they are not that expensive.&nbsp;But how will a more secure operating system affect this market? The cost of hacking an operating system that has been designed to be secure is&nbsp;obviously higher than hacking the typical unpatched Windows.&nbsp;So in theory, the prices for stolen accounts or botnets&nbsp;should rise.<\/li>\n<li>But does a wide distribution of a secure operating system only affect the Darknet market? Many attacks like phishing with spam waves depend heavily on a large number of hijacked devices. Will the overall security of the internet improve, if there are less vulnerable devices available to use as an attack vector? And if it does, is there a measurable threshold of secure to insecure devices?<\/li>\n<li>In their <a href=\"https:\/\/www.google.com\/policies\/privacy\/\" target=\"_blank\" rel=\"noopener\">Terms of Use<\/a> Google&nbsp;specifies which data are being captured while you are using your Chrome OS device. This should of course be validated by external reviews. The question beside the correctness of their Terms of Use is,&nbsp;how this data can be correlated and what they tell about you and what you are doing.<\/li>\n<li>As mentioned before, the security mechanisms of Chrome OS are designed to protect against random optimistic attacks from the internet. This leads to the simple question: Is it possible to hijack a Chrome OS device remotely (getting a root shell on the device and surviving a reboot)&nbsp;and how much effort does it take compared to hijacking a Windows or OS X device?<\/li>\n<li>Google <a href=\"https:\/\/chrome.googleblog.com\/2016\/05\/the-google-play-store-coming-to.html\" target=\"_blank\" rel=\"noopener\">recently announced<\/a> that Android Apps will run on Chrome OS devices in the near future. But how will the introduction of this new feature affect the overall security of Chrome OS? Can Android Apps be imprisoned as securely as&nbsp;Web Apps, or even better?<\/li>\n<\/ul>\n<h4>Image Sources:<\/h4>\n<ul>\n<li><a href=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg\">https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg<\/a>, author: Nessy-Pic<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In this post, we want to take a look on the concept of defense in depth. Therefore we are going to examine Chrome OS, the niche operation system for web users.<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26,651],"tags":[52,4,54,27],"ppma_author":[681],"class_list":["post-902","post","type-post","status-publish","format-standard","hentry","category-secure-systems","category-system-designs","tag-chromeos","tag-linux","tag-sandbox","tag-security"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":20290,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/02\/zero-trust-security-the-further-development-of-perimeter-security\/","url_meta":{"origin":902,"position":0},"title":"Zero Trust Security &#8211; The further development of perimeter security?","author":"Max Merz","date":"2. August 2021","format":false,"excerpt":"Most companies use perimeter security to secure their cooperate applications, services and data from attackers and unauthorised users. This approach includes a cooperate network, where clients, that are part of the network are able to access the applications. This includes attackers that got access to these networks.Additionally more applications are\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":27760,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2025\/07\/23\/what-distinguishes-an-enterprise-operating-system-from-your-desktop\/","url_meta":{"origin":902,"position":1},"title":"What distinguishes an enterprise operating system from your desktop?","author":"Dominik M\u00fcller","date":"23. July 2025","format":false,"excerpt":"Note: This article was written for the module Enterprise IT (113601a) during the summer semester of 2025. Introduction An operating system (OS) manages hardware resources, enables application execution, and provides interfaces for users and developers alike. But the context in which an OS is deployed determines its form and function.\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2025\/07\/virtual-machine-virtual-private-server-vmware-vsphere-computer-servers-virtualization-png-favpng-UZyJvXCPwqpQ9UKLEaNXgWG0m-1116791087.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2025\/07\/virtual-machine-virtual-private-server-vmware-vsphere-computer-servers-virtualization-png-favpng-UZyJvXCPwqpQ9UKLEaNXgWG0m-1116791087.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2025\/07\/virtual-machine-virtual-private-server-vmware-vsphere-computer-servers-virtualization-png-favpng-UZyJvXCPwqpQ9UKLEaNXgWG0m-1116791087.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2025\/07\/virtual-machine-virtual-private-server-vmware-vsphere-computer-servers-virtualization-png-favpng-UZyJvXCPwqpQ9UKLEaNXgWG0m-1116791087.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":25679,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/09\/02\/browser-session-hijacking\/","url_meta":{"origin":902,"position":2},"title":"Browser Session Hijacking","author":"Maximilian von Detten","date":"2. September 2023","format":false,"excerpt":"This article outlines the dangers of insufficiently protected browser session cookies, how they work, how they can be hijacked and what to do to avoid it.","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/xf9ERdBkM5M\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":26825,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2025\/02\/26\/defense-in-depth-in-an-enterprise-environment\/","url_meta":{"origin":902,"position":3},"title":"Defense in-depth in an enterprise environment","author":"Steffen Schawjinski","date":"26. February 2025","format":false,"excerpt":"To run a successful business in the IT market, you have to have some sort of Cybersecurity. To forgo security does not only hurt the reputation immensely once a data breach happens, a data breach is also very costly. According to Forbes[^1] and IBM[^2] the average cost of a data\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2025\/02\/blog-pyramid-pain-01-768x432-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2025\/02\/blog-pyramid-pain-01-768x432-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2025\/02\/blog-pyramid-pain-01-768x432-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2025\/02\/blog-pyramid-pain-01-768x432-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10943,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/09\/11\/behind-the-scenes-of-modern-operating-systems-security-through-isolation-part-1\/","url_meta":{"origin":902,"position":4},"title":"Behind the scenes of modern operating systems \u2014 Security through isolation (Part 1)","author":"Leon Klingele","date":"11. September 2020","format":false,"excerpt":"In recent years, since the Internet has become available to almost anyone, application and runtime security is important more than ever. Be it an (unknown) application you download and run from the Internet or some server application you expose to the Internet, it's almost certainly a bad idea to run\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1299,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/08\/16\/exploring-docker-security-part-2-container-flaws\/","url_meta":{"origin":902,"position":5},"title":"Exploring Docker Security &#8211; Part 2: Container flaws","author":"Patrick Kleindienst","date":"16. August 2016","format":false,"excerpt":"Now that we've understood the basics, this\u00a0second part will\u00a0cover the most relevant container threats, their possible impact as well as\u00a0existent countermeasures. Beyond that, a short overview\u00a0of the most important sources for container threats will be provided. I'm pretty sure you're not counting on most\u00a0of them. Want to know more? Container\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/article-1301858-0ABD7881000005DC-365_964x543.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/article-1301858-0ABD7881000005DC-365_964x543.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/article-1301858-0ABD7881000005DC-365_964x543.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/article-1301858-0ABD7881000005DC-365_964x543.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":681,"user_id":5,"is_guest":0,"slug":"bb074","display_name":"Benjamin Binder","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/b39750be005f19ce71d3af93115f9d5f02d18769c36bfa750ca4de423b20d981?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=902"}],"version-history":[{"count":41,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/902\/revisions"}],"predecessor-version":[{"id":24686,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/902\/revisions\/24686"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=902"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}