PALANTIR: Zero-Trust Architecture for Managed Security Service Provider

Author

Compastié, Maxime

Sisinni, Silvia

Gurung, Supreshna

Fernández, Carolina

Jacquin, Ludovic

Mlakar, Izidor

Šafran, Valentino

Lioy, Antonio

Pedone, Ignazio

Publication date

2023-01-13



Abstract

The H2020 PALANTIR project aims at delivering a Security-as-a-Service solution to SMEs and microenterprises via the exploitation of containerised Network Functions. However, these functions are conceived by third-party developers and can also be deployed in untrustworthy virtualisation layers, depending on the subscribed delivery model. Therefore, they cannot be trusted and require a stringent monitoring to ensure their harmlessness, as well as adequate measures to remediate any nefarious activities. This paper justifies, details and evaluates a Zero-Trust architecture supporting PALANTIR’s solution. Specifically, PALANTIR periodically attests the service and infrastructure’s components for signs of compromise by implementing the Trusted Computing paradigm. Verification addresses the firmware, OS and software using UEFI measured boot and Linux Integrity Measurement Architecture, extended to support containerised application attestation. Mitigation actions are supervised by the Recovery Service and the Security Orchestrator based on OSM to, respectively, determine the adequate remediation actions from a recovery policy and enforce them down to the lower layers of the infrastructure through local authenticated enablers. We detail an implementation prototype serving a baseline for quantitative evaluation of our work.

Document Type

Article
Published version

Language

English

CDU Subject

621.3 Electrical engineering

Subject

Cibersecurity; Security

Pages

16 p.

Publisher

CEUR Workshop Proceedings

Collection

Proceedings of the 29th Computer & Electronics Security Application Rendezvous;

Version of

CEUR Workshop proceedings Vol-3329

Documents

Compastié et al. - PALANTIR Zero-Trust Architecture for Managed Secu.pdf

1.334Mb

 

Rights

©️ 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).

This item appears in the following Collection(s)