Securing infrastructure at LinkedIn’s scale demands a comprehensive strategy, starting with trusted hardware and extending to every line of code. The company has detailed its approach to establishing a verifiable chain of trust for its Kubernetes workloads, a critical step in protecting user data and system integrity. This effort focuses on assigning every piece of software, from feed services to complex ML pipelines, a digital credential acting as a signed ID card.
This system aims to prevent 'identity spoofing' by attesting each workload's identity against an internal Identity Registry. The entire process is integrated into the software lifecycle, ensuring workloads are identified and secured from creation.
Building a Next-Generation Security Framework
As LinkedIn's infrastructure expands, so does the diversity of workloads requiring robust security. The challenge lies in securing varied systems like Flink streams, Airflow jobs, and third-party databases such as Couchbase and MySQL. To meet this, LinkedIn extended cert-manager, a popular open-source certificate management tool.
A key enabler is cert-manager's CSI driver, which injects certificates directly into workload containers as volumes. This method ensures private keys remain on the node, mitigating exfiltration risks.
The multi-cluster architecture presented a significant hurdle, as jobs orchestrated in one cluster can spawn workers in another. The workload identity system needed to operate consistently across these boundaries, demanding standardized certificate issuance and attestation.
cert-manager Integration at LinkedIn
LinkedIn utilizes cert-manager for automated certificate management, including issuance, rotation, and deletion. Crucially, it integrates seamlessly with an internal Identity Registry for strong workload attestation. The platform is adaptable, supporting custom issuers and approver policies.