SECURING SECRETS WITH HYBRID ENCRYPTION AND DIGITAL SIGNATURE SCHEME IN KUBERNETES

Kubernetes is well known for its success in solving the complexity of managing container-based applications. However, as the problem is solved, the complexity in security aspect also increases, especially in secret management in Kubernetes. Poor secret management can lead to secret leaks with pot...

Full description

Saved in:
Bibliographic Details
Main Author: Abdullah Fachrezzi, Rezda
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/74110
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
Description
Summary:Kubernetes is well known for its success in solving the complexity of managing container-based applications. However, as the problem is solved, the complexity in security aspect also increases, especially in secret management in Kubernetes. Poor secret management can lead to secret leaks with potentially fatal consequences. From 2018 to 2021, there are several cases of secret leaks in Kubernetes. To overcome these problems, a solution is proposed based on the problem analysis conducted. This problem involves the confidentiality and integrity aspects of secret storage and usage in Kubernetes. The solution to the confidentiality problem is to encrypt the secret at rest by using hybrid encryption scheme with RSA-OAEP and AES-GCM algorithms. This solution is chosen because the current symmetric encryption capability of Kubernetes is considered not to solve the existing problems. The solution for integrity problem is to use digital signature scheme with RSA algorithm because there is no integrity assurance mechanism for secrets in Kubernetes. This solution also involves a logging mechanism for secret-related operations. This solution is implemented in the form of additional components in Kubernetes named Kube-Encryptor and Kube-Decryptor. The results of the implemented solutions went through a series of tests and evaluations. The test results show that the solution successfully performs secrets encryption, decryption, signing, verification, and logging for related operations. The evaluation results show that the solution successfully solves the existing problems. The proposed solution design is also successfully integrated with other components of the final capstone project. However, the residual risk identification results show that there are still some problems that were not identified in the problem and solution analysis. At the end of this final project, several suggestions are given for further development of the application, including resolving the residual risks.