Standardized compilations of security guidelines
allow to systematically develop security concepts.
Examples are the IT-Grundschutz (BSI, 2011) from
the Federal Office for Information Security (BSI), the
ISO 27001 certification (BSI, 2014), or the Infor-
mation Security Practice Guides (NIST, 2020) from
the National Institute of Standards and Technology
(NIST). In this work, we focus on the IT-Grundschutz
approach from BSI. Currently, the BSI is develop-
ing the module ”SYS.1.6 Container” (BSI, 2020).
We have already shown that SYS.1.6 is applicable
to secure containers, which are executed on a single
host (Haar and Buchmann, 2019). In this work, we
use a typical database scenario to analyze the suitabil-
ity of the 2020 draft of SYS.1.6 to secure an orches-
trated container virtualization.
We have developed a protection concept accord-
ing to IT-Grundschutz for a typical Kubernetes sce-
nario (Vaughan-Nichols S., 2020). This scenario con-
sists of a DBMS with customer data, a business logic
including payment system, and a web application as a
front end. We model the information domain for our
Kubernetes system according to BSI standard 200-
2 (BSI, 2017a). Then we determine the protection
needs and analyze the elementary threats described in
the BSI module SYS.1.6 Container. Because some
data objects in the database in the information do-
main require the protection need ”high”, we will do
a risk analysis according to BSI standard 200-3 (BSI,
2017b) in a second step to identify and evaluate addi-
tional threats to our Kubernetes System.
We have observed that in an orchestrated container
virtualization system, a single data object with the
protection need ”high” for confidentiality, integrity
or availability ensures that the entire system must be
assigned with this protection need. This is, because
the orchestration decides at run-time which instances
of a container are running and where. Our analy-
sis has shown that SYS.1.6 is suitable for securing
such a scenario. However, we have found three ad-
ditional threats that are not considered in SYS.1.6.
Two threats could be used to implement an automated
exploit, as soon as an attacker finds a corresponding
vulnerability. Note that SYS.1.6 from the BSI consid-
ers the same set of security risks as the ”Application
Container Security Guide” (NIST, 2017) from NIST.
Thus, our results can be transferred to the Information
Security Practice Guides.
Structure of the Work. Section 2 describes Docker,
Kubernetes and IT-Grundschutz. In Sections 3 and 4
we perform a risk analysis and compare our findings
with those from BSI. Section 5 concludes.
2 RELATED WORK
In this section, we explain the standard protec-
tion and risk analysis according to BSI, the module
SYS.1.6 (BSI, 2020) and the basics of Docker and
Kubernetes.
2.1 BSI Standard-protection
The BSI standard 200-2 (BSI, 2017a) defines six steps
to secure a typical IT system. We use these steps as
our research method.
1. The scope must be defined first. The scope is the
information domain to be protected.
2. In the structure analysis, the processes, applica-
tions, IT-Systems, infrastructures, etc. within the
scope are defined as target objects.
3. The third step defines protection needs for the
business processes, the information processed and
the information technology used.
4. In the modeling step, the modules of the IT-
Grundschutz-Kompendium (BSI, 2019) are used
to identify security measures for the target objects,
depending on the protection needs.
5. The IT-Grundschutz-Check finds out if the im-
plemented security measures are sufficient to ful-
fill the protection needs.
6. A risk analysis must be implemented if a target
object has protection needs above normal, if if no
BSI module exists for a target object, or if a target
object is operated in an unusual way.
The risk analysis identifies additional threats that
are not considered in the modules. The BSI standard
200-3 (BSI, 2017b) provides a set of questions that
help to perform such a risk analysis. These questions
should be answered by experts, employees, adminis-
trators and users for each target object:
• Which ”force majeure” threats are relevant?
• Are there organizational deficiencies that have an
impact on information security?
• Can the safety be compromised by human errors?
• Do technical failures result in security problems?
• Which threats can arise from external attacks?
• Is it possible for employees to willfully impair the
operation of the target object?
• Is it possible that objects outside of the informa-
tion system cause a risk?
• What information is provided by the manufac-
turer’s documentation and third parties?
Securing Orchestrated Containers with BSI Module SYS.1.6
677