Title :
Protection of a Shared HPC Cluster
Author :
Blanc, Mathieu ; Briffaut, Jérémy ; Coullet, Thibault ; Fonda, Maxime ; Toinard, Christian
Author_Institution :
DAM, CEA, Arpajon, France
Abstract :
The security of shared High Performance Computing clusters is still an open research problem. Existing solutions deal with sandboxing and Discretionary Access Control for controlling remote connections. Guaranteeing security properties for a shared cluster is complex since users demand an environment at the same time efficient and preventing confidentiality and integrity violations. This paper studies two different approaches for protecting remote interactive accesses against malicious operations. Those two approaches leverage the SELinux protection. They have been successfully implemented using standard MAC from SELinux, and guarantee supplementary security properties thanks to our PIGA HIPS. The paper compares those two different approaches. It presents a real use case for the security of a shared cluster that allows interactive connections for users while preventing confidentiality and integrity violations. We propose a new approach to extend the protection offered by SELinux. One of the two policies studied previously is used as a basis, and PIGA is used to define new security properties that cannot be guaranteed by SELinux. These new properties are defined in the article, in a language specific to PIGA. Their objective is to prevent complex or indirect malicious activities that use combinations of processes and covert channels. Then PIGA analyses the SELinux policy and finds the remaining allowed illegal activities, either direct or indirect. Finally the article shows how PIGA can be used as an HIPS to enforce these new security properties that cannot be enforced by SELinux alone.
Keywords :
Linux; authorisation; parallel processing; pattern clustering; PIGA HIPS; PIGA analysis; SELinux policy; SELinux protection; discretionary access control; high performance computing cluster; interactive connection; malicious operation; open research problem; remote connection control; remote interactive access; shared HPC cluster security; standard MAC; Access control; Containers; Context; Hip; Linux; Servers; cluster security; mandatory access control; security policies;
Conference_Titel :
Emerging Security Information Systems and Technologies (SECURWARE), 2010 Fourth International Conference on
Conference_Location :
Venice
Print_ISBN :
978-1-4244-7517-9
Electronic_ISBN :
978-0-7695-4095-5
DOI :
10.1109/SECURWARE.2010.51