WatchIT: Who Watches Your IT Guy?

Noam Shalev, Idit Keidar, Yaron Weinsberg, Yosef Moatti, Elad Ben-Yehuda

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

System administrators have unlimited access to system resources. As the Snowden case highlighted, these permissions can be exploited to steal valuable personal, classified, or commercial data. This problem is exacerbated when a third party administers the system. For example, a bank outsourcing its IT would not want to allow administrators access to the actual data. We propose WatchIT: a strategy that constrains IT personnel’s view of the system and monitors their actions. To this end, we introduce the abstraction of perforated containers – while regular Linux containers are too restrictive to be used by system administrators, by “punching holes” in them, we strike a balance between information security and required administrative needs. Following the principle of least privilege, our system predicts which system resources should be accessible for handling each IT issue, creates a perforated container with the corresponding isolation, and deploys it as needed for fixing the problem. Under this approach, the system administrator retains superuser privileges, however only within the perforated container limits. We further provide means for the administrator to bypass the isolation, but such operations are monitored and logged for later analysis and anomaly detection. We provide a proof-of-concept implementation of our strategy, which includes software for deploying perforated containers, monitoring mechanisms, and changes to the Linux kernel. Finally, we present a case study conducted on the IT database of IBM Research in Israel, showing that our approach is feasible.

Original languageEnglish
Title of host publicationSOSP 2017 - Proceedings of the 26th ACM Symposium on Operating Systems Principles
Pages515-530
Number of pages16
ISBN (Electronic)9781450350853
DOIs
StatePublished - 14 Oct 2017
Event26th ACM Symposium on Operating Systems Principles, SOSP 2017 - Shanghai, China
Duration: 28 Oct 201731 Oct 2017

Publication series

NameSOSP 2017 - Proceedings of the 26th ACM Symposium on Operating Systems Principles

Conference

Conference26th ACM Symposium on Operating Systems Principles, SOSP 2017
Country/TerritoryChina
CityShanghai
Period28/10/1731/10/17

Keywords

  • Perforated Container
  • Privileged Insider Threat

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'WatchIT: Who Watches Your IT Guy?'. Together they form a unique fingerprint.

Cite this