版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
NISTSpecialPublication800NISTSP800-233
ServiceMeshProxyModelsforCloud-NativeApplications
RamaswamyChandramouliZackButcher
JamesCallaghan
Thispublicationisavailablefreeofchargefrom:
/10.6028/NIST.SP.800-233
NISTSpecialPublication800NISTSP800-233
ServiceMeshProxyModelsforCloud-NativeApplications
RamaswamyChandramouli
ComputerSecurityDivisionInformationTechnologyLaboratory
ZackButcher
Tetrate,Inc.
JamesCallaghan
control-plane.io,
Inc.
Thispublicationisavailablefreeofchargefrom:
/10.6028/NIST.SP.800-233
October2024
U.S.DepartmentofCommerce
GinaM.Raimondo,Secretary
NationalInstituteofStandardsandTechnology
LaurieE.Locascio,NISTDirectorandUnderSecretaryofCommerceforStandardsandTechnology
NISTSP800-233ServiceMeshProxyModelsfor
October2024Cloud-NativeApplications
Certaincommercialequipment,instruments,software,ormaterials,commercialornon-commercial,areidentified
inthispaperinordertospecifytheexperimentalprocedureadequately.SuchidentificationdoesnotimplyrecommendationorendorsementofanyproductorservicebyNIST,nordoesitimplythatthematerialsorequipmentidentifiedarenecessarilythebestavailableforthepurpose.
TheremaybereferencesinthispublicationtootherpublicationscurrentlyunderdevelopmentbyNISTin
accordancewithitsassignedstatutoryresponsibilities.Theinformationinthispublication,includingconceptsandmethodologies,maybeusedbyfederalagenciesevenbeforethecompletionofsuchcompanionpublications.
Thus,untileachpublicationiscompleted,currentrequirements,guidelines,andprocedures,wheretheyexist,
remainoperative.Forplanningandtransitionpurposes,federalagenciesmaywishtocloselyfollowthedevelopmentofthesenewpublicationsbyNIST.
OrganizationsareencouragedtoreviewalldraftpublicationsduringpubliccommentperiodsandprovidefeedbacktoNIST.ManyNISTcybersecuritypublications,otherthantheonesnotedabove,areavailableat
/publications.
Authority
ThispublicationhasbeendevelopedbyNISTinaccordancewithitsstatutoryresponsibilitiesundertheFederal
InformationSecurityModernizationAct(FISMA)of2014,44U.S.C.§3551etseq.,PublicLaw(P.L.)113-283.NISTisresponsiblefordevelopinginformationsecuritystandardsandguidelines,includingminimumrequirementsfor
federalinformationsystems,butsuchstandardsandguidelinesshallnotapplytonationalsecuritysystems
withouttheexpressapprovalofappropriatefederalofficialsexercisingpolicyauthorityoversuchsystems.ThisguidelineisconsistentwiththerequirementsoftheOfficeofManagementandBudget(OMB)CircularA-130.
Nothinginthispublicationshouldbetakentocontradictthestandardsandguidelinesmademandatoryand
bindingonfederalagenciesbytheSecretaryofCommerceunderstatutoryauthority.NorshouldtheseguidelinesbeinterpretedasalteringorsupersedingtheexistingauthoritiesoftheSecretaryofCommerce,Directorofthe
OMB,oranyotherfederalofficial.ThispublicationmaybeusedbynongovernmentalorganizationsonavoluntarybasisandisnotsubjecttocopyrightintheUnitedStates.Attributionwould,however,beappreciatedbyNIST.
NISTTechnicalSeriesPolicies
Copyright,Use,andLicensingStatements
NISTTechnicalSeriesPublicationIdentifierSyntax
PublicationHistory
ApprovedbytheNISTEditorialReviewBoardon2024-10-11
HowtoCitethisNISTTechnicalSeriesPublication:
ChandramouliR,ButcherZ,CallaghanJ(2024)ServiceMeshProxyModelsforCloud-NativeApplications.(NationalInstituteofStandardsandTechnology,Gaithersburg,MD),NISTSpecialPublication(SP)NISTSP800-233.
/10.6028/NIST.SP.800-233
AuthorORCIDiDs
RamaswamyChandramouli:0000-0002-7387-5858
NISTSP800-233ServiceMeshProxyModelsfor
October2024Cloud-NativeApplications
ContactInformation
sp800-233-comments@
NationalInstituteofStandardsandTechnology
Attn:ComputerSecurityDivision,InformationTechnologyLaboratory
100BureauDrive(MailStop8930)Gaithersburg,MD20899-8930
AdditionalInformation
Additionalinformationaboutthispublicationisavailableat
/pubs/sp/800/233/final,
includingrelatedcontent,potentialupdates,anddocumenthistory.
AllcommentsaresubjecttoreleaseundertheFreedomofInformationAct(FOIA).
NISTSP800-233ServiceMeshProxyModelsfor
October2024Cloud-NativeApplications
i
Abstract
Theservicemeshhasbecomethedefactoapplicationservicesinfrastructureforcloud-nativeapplications.Itenablesthevariousruntimefunctionsofanapplicationthroughproxiesthat
formthedataplaneoftheservicemesh.Dependingonthedistributionofthenetworklayer
functionsandthegranularityofassociationoftheproxiestoindividualservicesandcomputingnodes,differentproxymodelsordataplanearchitectureshaveemerged.Thisdocument
describesathreatprofileforeachofthedataplanearchitectureswithadetailedthreatanalysistomakerecommendationsontheirapplicabilityforcloud-nativeapplicationswithdifferent
securityriskprofiles.
Keywords
cloud-nativeapplication;dataplanearchitecture;proxymodel;servicemesh;threatprofile.
ReportsonComputerSystemsTechnology
TheInformationTechnologyLaboratory(ITL)attheNationalInstituteofStandardsandTechnology(NIST)promotestheU.S.economyandpublicwelfarebyprovidingtechnical
leadershipfortheNation’smeasurementandstandardsinfrastructure.ITLdevelopstests,testmethods,referencedata,proofofconceptimplementations,andtechnicalanalysestoadvance
thedevelopmentandproductiveuseofinformationtechnology.ITL’sresponsibilitiesincludethedevelopmentofmanagement,administrative,technical,andphysicalstandardsand
guidelinesforthecost-effectivesecurityandprivacyofotherthannationalsecurity-related
informationinfederalinformationsystems.TheSpecialPublication800-seriesreportsonITL’sresearch,guidelines,andoutreacheffortsininformationsystemsecurity,anditscollaborativeactivitieswithindustry,government,andacademicorganizations.
NISTSP800-233ServiceMeshProxyModelsfor
October2024Cloud-NativeApplications
ii
PatentDisclosureNotice
NOTICE:ITLhasrequestedthatholdersofpatentclaimswhoseusemayberequiredfor
compliancewiththeguidanceorrequirementsofthispublicationdisclosesuchpatentclaimstoITL.However,holdersofpatentsarenotobligatedtorespondtoITLcallsforpatentsandITLhasnotundertakenapatentsearchinordertoidentifywhich,ifany,patentsmayapplytothis
publication.
Asofthedateofpublicationandfollowingcall(s)fortheidentificationofpatentclaimswhoseusemayberequiredforcompliancewiththeguidanceorrequirementsofthispublication,nosuchpatentclaimshavebeenidentifiedtoITL.
NorepresentationismadeorimpliedbyITLthatlicensesarenotrequiredtoavoidpatentinfringementintheuseofthispublication.
NISTSP800-233ServiceMeshProxyModelsfor
October2024Cloud-NativeApplications
iii
TableofContents
ExecutiveSummary 1
1.Introduction 2
1.1.L4andI7Functionsofproies…3
12.0bectieandTargetAudience.…………3
13.elationshiptootherNISTDocuments………………4
1.4.Documentstucture…4
2.TypicalServiceMeshDataPlaneCapabilitiesandAssociatedProxyFunctions 5
3.ProxyModels(DataPlaneArchitectures)inServiceMeshImplementations 7
31.L4and17proxypersericelnstance(OPA-)-sidecarModel…7
32.sharedL4-L7perseniceModel(OPA.2h……….8
3.3.sharedL4andL7Model(DPA-3).........9
3.A,L4andL7aspartoftheApplicationModel(OPA-4)l………10
4.DataPlaneArchitectureThreatScenariosandAnalysisMethodology 12
4.1.ThreatAnalsiMethodology….13
5.DetailedThreatAnalysisforDataPlaneArchitectures 14
5.1.ThreatAnalysisforL4andL7proxyperserviceInstance(DPA-1)—sidecarModel...........14
5.1.1.CompromisedL4Proxy(TR-1) 14
5.1.2.CompromisedApplicationContainer(TR-2) 14
5.1.3.CompromiseofBusinessData(TR-3) 15
5.1.4.CompromisedL7Proxy(TR-4) 15
5.1.5.CompromiseofSharedL7Proxy(TR-5) 15
5.1.6.OutdatedClientLibrariesinApplications(TR-6) 16
5.1.7.DenialofService(TR-7) 16
5.1.8.ResourceConsumption(TR-8) 17
5.1.9.PrivilegedL4Proxy(TR-9) 17
5.1.10.DataPlane(ServiceMesh)Bypassed(TR-10) 17
5.1.11OverallThreatScore 18
52.ThreatAnalysisforsharedL4-L7perseniceModel(OPA-2)……18
5.2.1.CompromisedL4Proxy(TR-1) 18
5.2.2.CompromisedApplicationContainer(TR-2) 18
5.2.3.CompromiseofBusinessData(TR-3) 18
5.2.4.CompromisedL7Proxy(TR-4) 19
5.2.5.CompromiseofSharedL7Proxy(TR-5) 19
5.2.6.OutdatedClientLibrariesinApplications(TR-6) 19
NISTSP800-233ServiceMeshProxyModelsfor
October2024Cloud-NativeApplications
iv
5.2.7.DenialofService(TR-7) 19
5.2.8.ResourceConsumption(TR-8) 20
5.2.9PrivilegedL4Proxy(TR-9) 20
5.2.10DataPlane(ServiceMesh)Bypassed(TR-10) 21
5.2.11OverallThreatScore 21
5.3.1.CompromisedL4Proxy(TR-1) 21
5.3.2.CompromisedApplicationContainer(TR-2) 22
5.3.3.CompromiseofBusinessData(TR-3) 22
5.3.4.CompromisedL7Proxy(TR-4) 22
5.3.5.CompromiseofSharedL7Proxy(TR-5) 23
5.3.6.OutdatedClientLibrariesinApplications(TR-6) 23
5.3.7.DenialofService(TR-7) 23
5.3.8.ResourceConsumption(TR-8) 23
5.3.9.PrivilegedL4Proxy(TR-9) 24
5.3.10.DataPlane(ServiceMesh)Bypassed(TR-10) 24
5.3.11OverallThreatScore 24
5.4.ThreatAnalysisforL4andL7aspartoftheApplicationModel(gRpcproxylessModel(DPA-4))
25
5.4.1.CompromisedL4Proxy(TR-1) 25
5.4.2.CompromisedApplicationContainer(TR-2) 25
5.4.3.CompromiseofBusinessData(TR-3) 25
5.4.4.CompromisedL7Proxy(TR-4) 25
5.4.5.CompromiseofSharedL7Proxy(TR-5) 26
5.4.6.OutdatedClientLibrariesinApplications(TR-6) 26
5.4.7.DenialofService(TR-7) 26
5.4.8.ResourceConsumption(TR-8) 27
5.4.9PrivilegedL4Proxy(TR-9) 27
5.4.10DataPlane(ServiceMesh)Bypassed(TR-10) 27
5.4.11OverallThreatScore 28
6.RecommendationsBasedontheApplicationSecurityRiskProfile 29
7.SummaryandConclusions............................................................................................................32
NISTSP800-233ServiceMeshProxyModelsfor
October2024Cloud-NativeApplications
v
References.......................................................................................................................................33
NISTSP800-233ServiceMeshProxyModelsfor
October2024Cloud-NativeApplications
vi
Acknowledgments
TheauthorswouldliketoexpresstheirthankstoFrancescoBeltraminiofcontrol-plane.ioforparticipatingindiscussionsandprovidinghisvaluableperspective.TheauthorswouldalsoliketoexpresstheirthankstoIsabelVanWykofNISTforherdetailededitorialreview,bothforthepubliccommentversionaswellasforthefinalpublication
1
ExecutiveSummary
Acentralizedinfrastructurecalledaservicemeshcanproviderun-timeservicesforcloud-nativeapplicationsthatconsistofmultiplelooselycoupledcomponentscalledmicroservices.These
servicesincludesecurecommunication,servicediscovery,resiliency,andauthorizationof
applicationcommunication.Theseservicesaremainlyprovidedthroughproxiesthatformthedataplaneoftheservicemesh,whichisthelayerthathandlesapplicationtrafficatruntime
andenforcespolicy.
ThefunctionsthattheproxiesprovidecanbebroadlycategorizedintotwogroupsbasedontheOpenSystemsInterconnection(OSI)model’snetworklayertowhichthosefunctionspertain:
Layer4(“L4”)andLayer7(“L7”).Inmostservicemeshdeploymentsinproduction
environmentstoday,allproxyfunctionsthatprovideservicesinbothL4andL7layersare
packedintoasingleproxythatisassignedtoasinglemicroservice.Thisservicemeshproxy
modeliscalledasidecarproxymodelsincetheproxyisnotonlyassociatedwithasingleservicebutisimplementedtoexecuteinthesamenetworkspaceastheservice.
However,performanceandresourceconsiderationshaveledtotheexplorationofalternate
proxymodelsthatinvolvesplittingL4andL7functionsintodifferentproxiesandthe
associationorassignmentsoftheseproxiestoeitherasingleserviceoragroupofservices.Thisenablestheproxiestobeimplementedatdifferentlocationsatthegranularityofanoderatherthanatthelevelofservices.Thoughdifferentmodelsaretheoreticallypossible,thisdocumentonlyconsidersservicemeshproxymodelsinthedataplaneimplementationofcommonlyusedservicemeshofferingsatdifferentstages.
Variouspotentialorlikelythreatstoproxyfunctionsmayresultindifferenttypesofexploitsindifferentproxymodels.Thisvariationisduetoseveralfactors,suchastheattacksurface(i.e.,
communicationpatternstowhichaparticularproxyisexposed),thenumberofclients
(services)served,andtheOSIlayerfunctionsthattheyprovide(e.g.,L7functionsaremorecomplicatedandlikelytohavemorevulnerabilitiesthanL4functions).Thetwomain
contributionsofthisdocumentarethefollowing:
1.Thenatureoftheexploitsthatarepossibleforeachthreatineachoftheproxymodelsischaracterizedbyassigningscorestotheimpactandlikelihoodofeachofthethreatsineachoftheproxymodelsorarchitecturalpatterns,resultinginathreatprofilethatis
associatedwitheacharchitecturalpatternorproxymodelofservicemesh.
2.Eachthreatprofilehasaninherentsetofsecuritytrade-offsatanarchitecturallevel.
Theimplicationsofthesetrade-offsinmeetingtherequirementsassociatedwiththe
securityriskprofilesofdifferentcloud-nativeapplicationsareanalyzedtomakeabroadsetofrecommendationstowardspecificarchitecturalpatternsthatareappropriateforapplicationswithdifferentsecurityriskprofiles.
NISTSP800-233ServiceMeshProxyModelsfor
October2024Cloud-NativeApplications
2
1.Introduction
“Cloud-native”referstoanarchitecturalphilosophyforbuildingscalable,resilientsystemsthat
aredesignedtoleveragetheadvantagesofcloudcomputingenvironments.Cloud-native
applicationscanrunbothon-premisesandinpubliccloudplatformsandarenormallybuilt
usingagiledevelopmentmethodologies,suchascontinuousintegration/continuousdelivery(CI/CD).Typically,technologiessuchascontainerizationandvirtualmachines(VMs)areused,andresilienceandfail-safefeatureswillbebuiltin.
Microservices-basedapplicationsuseanarchitecturalapproachinwhichtheentireapplicationisbrokenintolooselycoupledcomponentsthatcanbeindependentlyupdatedandscaled.Theimplementationofmicroservicesisenabledusingcontainersthatinturnrequireorchestrationtoolsandoftenemployacentralizedservicesinfrastructure(e.g.,servicemesh)toprovideallruntimeapplicationservices,includingnetworkconnectivity,security,resiliency,and
monitoringcapabilities.Microservices-basedapplicationscanbeimplementedanddeployedascloud-native,thoughtheyrepresentanindependentarchitecturalapproach.
Theinfrastructureservicesorfunctionsprovidedbyaservicemeshduringapplicationruntimeareprovidedbyentitiescalledproxies,whichconstitutethedataplaneoftheservicemesh.Inaddition,theservicemeshconsistsofanotherarchitecturalcomponentcalledthecontrol
plane,whichsupportsthefunctionsofthedataplanethroughinterfacestodefine
configurations,injectsoftwareprograms,andprovidesecurityartifacts(e.g.,certificates).
Variousconfigurationsforproxiesarebeingdevelopedandtestedbasedontheperformanceandsecurityassurancedataobtainedduringthedeploymentofservicemeshoverthelast
severalyears.Theseconfigurationsareproxy(implementation)modelsthatarebasedontheOSIlayerfunctionsthattheyprovide(describedinthefollowingparagraphs)andthe
granularityofassociationbetweenaproxyandservices.Sinceproxiesarethepredominantentitiesofthedataplaneofaservicemesh,thesevariousproxymodelsarealsocalleddataplanearchitectures.
TheOSImodel
[1]
isausefulabstractionforthinkingaboutthefunctionsrequiredtoserveanapplicationoverthenetwork.Itdescribesseven“l(fā)ayers,”fromthephysicalwiresthatconnecttwomachines(i.e.,Layer1–L1,thephysicallayer)totheapplicationitself(i.e.,Layer7–L7,theapplicationlayer).
Layers3,4,and7arekeytofacilitatingcommunicationbetweencloud-nativeapplications(e.g.,twomicroservicesmakingHypertextTransferProtocol(HTTP)/RESTcallstoeachother):
?Layer3(“L3”),thenetworklayer,facilitatesbaselineconnectivitybetweentwo
workloadsorserviceinstances.Innearlyallcases,theInternetProtocol(IP)isusedastheL3implementation.
?Layer4(“L4”),thetransportlayer,facilitatesthereliabletransmissionofdatabetweenworkloadsonthenetwork.Italsoincludescapabilitieslikeencryption.TransportControlProtocol(TCP)andUserDatagramProtocol(UDP)arecommonlyusedL4
implementations,wheretransportlayersecurity(TLS)providesencryption.
NISTSP800-233ServiceMeshProxyModelsfor
October2024Cloud-NativeApplications
3
?Layer7(“L7”),theapplicationlayer,iswhereprotocolslikeHTTPoperate—inuserapplicationsthemselves(e.g.,HTTPwebservers,SecureShell(SSH)servers).
Withrespecttothelayersabove,aservicemesh’sproxiesincloud-nativeenvironmentsare:
?AgnostictoL3ifthemicroserviceinstancescancommunicateatL3andtheproxycancommunicatewiththemesh’scontrolplane.
?AtLayer4(L4):Connectionestablishment,management,andresiliency(e.g.,
connection-levelretries);TLS(encryptionintransit);applicationidentity,authentication,andauthorization;accesspolicybasedonnetwork5-tuple(e.g.,sourceIPaddressand
port,destinationIPaddressandport,andtransportprotocol).
?AtLayer7(L7):Servicediscovery,request-levelresiliency(e.g.,retries,circuitbreakers,
outlierdetection);andapplicationobservability.
1.1.L4andL7FunctionsofProxies
Therearetwokeyaspectsofproxymodels:
1.Proxyfunctions:Thefunctionsthataservicemesh’sproxiesprovidecanbebroadly
categorizedintotwogroupsbasedontheOSImodel’slayer
[1]
towhichthosefunctionspertain:Layer4(“L4”)andLayer7(“L7”).TheassociatedproxiesarecalledL4proxies
andL7proxies,respectively.ThestudyofproxyfunctionsrequiresanunderstandingoftheOSI’sL4andL7layersfromthenetworkstackpointofviewandthespecificnetworkservicesprovidedbythoselayers.
2.Granularityofassociation:Aproxycanbeassociatedwithasinglemicroserviceinstance,anentireservice,ordeployedtoprovidefunctionsforagroupofservices.Dependingonthenatureofthisassociation,aproxymayexecutewithinthesamenetworkspaceas
theservice,atthesamenodewherethegroupofservicestowhichitcatersrun,orinanindependentnodededicatedtoproxieswherenoapplicationservicesrun.
1.2.ObjectiveandTargetAudience
Thisdocumentwillgiveabriefoverviewofthefourdataplanearchitectures(proxymodels)beingpursuedbyarangeofservicemeshimplementationstoday.Itwillalsoprovidethreatprofilesfordifferentproxymodelswithadetailedthreatanalysisthatinvolves10typesofcommonthreats.Thesethreatprofileswillinformrecommendationsregardingtheir
applicability(usage)forcloud-nativeapplicationswithdifferentsecurityriskprofiles.Thetargetaudiencefortheserecommendationsincludes:
?Infrastructureowners,platform/infrastructureengineers,andtheirteamleaderswhobuildanddeploysecureruntimeenvironmentsforapplicationsbychoosingtherightarchitecturefortheirenvironmentgiventheriskfactorsoftheapplicationsthattheywillberunningandtheresultingsecurityriskprofile.
NISTSP800-233ServiceMeshProxyModelsfor
October2024Cloud-NativeApplications
4
?Personnelinchargeofinfrastructureoperationswhoneedtobefamiliarwiththe
variousbuildingblocksoftheproxymodelsordataplanearchitectures(andtheir
associatedfunctionsandinteractions)totroubleshootintheeventofperformance(i.e.,availability)andsecurityissues
1.3.RelationshiptoOtherNISTDocuments
ThisdocumentcanbeusedasanadjuncttotheNISTSpecialPublication(SP)800-204seriesofpublications
[2][3][4][5],
whichofferguidanceonprovidingsecurityassuranceforcloud-native
applicationsintegratedwithaservicemeshfromthefollowingperspectives:strategy,
configuration,anddevelopment/deploymentparadigm.However,thisdocumentfocuseson
thevariousconfigurationsoftheapplicationserviceinfrastructureelements(i.e.,proxies)andtheresultingarchitectures(i.e.,dataplanearchitectureoftheservicemesh)thathavedifferent
securityimplicationsfortheapplicationthatishostedundereachoftheseconfigurations.
1.4.DocumentStructure
Thisdocumentisorganizedasfollows:
?
?
?
?
?
?
Section
2
liststhetypicalcapabilitiesofthedataplaneoftheservicemeshunderthreeheadings(i.e.,security,observability,andtrafficmanagement)andthecorrespondingL4andL7proxyfunctionsimplementedunderthosecapabilities.
Section
3
providesabriefoverviewofthefourproxymodelsordataplanearchitectures.Section
4
discussesproxymodelthreatscenariosandthethreatanalysismethodologyadoptedinthisdocumentforevaluatingthethreatprofilescoreforthefourdataplanearchitectures.
Section
5
providesadetailedthreatanalysisforthefourdataplanearchitecturesbyassigningscorestotheimpactandlikelihoodfactorsassociatedwitheachthreatandusingthemtoarriveatanoverallthreatscore.
Section
0
providesrecommendationsontheapplicability(usage)ofeachofthefourdataplanearchitecturesforcloud-nativeapplicationsofdifferentsecurityriskprofilesbasedontheirsecurityrequirements.
Section
0
providesthesummaryandconclusions.
NISTSP800-233ServiceMeshProxyModelsfor
October2024Cloud-NativeApplications
5
2.TypicalServiceMeshDataPlaneCapabilitiesandAssociatedProxyFunctions
Thisdocument’smethodologyexaminesthesecuritytrade-offsoftheproxymodels(i.e.,data
planearchitectures)andtheimplementationsofthevariouscapabilitiesthatresultasL4andL7functionsinproxies.Determiningthetotalityofproxyfunctionsrequiresananalysisofeach
capability,thecategoryitfallsunder,andthegranularityofthefunctionthatitprovidesatL4andL7levels.
Table1-SecurityCapabilities[15]
Capability
L4Function(s)
L7Function(s)
Service-to-serviceauthentication
SPIFFE,
viamTLScerts.Control
planeissuesashort-livedX.509
encodingt
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 表示團結的詞語一年級
- 微山二中高二年級2024-2025學年階段性測試1月份數學試題 微山二中高二年級2024-2025學年階段性測試1月份數學試題
- 【優(yōu)化方案】2022屆高三政治大一輪復習-必修3第2單元第5課文化創(chuàng)新-教學講義-
- 【-學案導學設計】2020-2021學年高中物理(人教版-選修3-1)第1章-第5節(jié)-課時作業(yè)
- 云南省騰沖四中學2014-2021學年高二上學期期中考試生物試卷(無答案)
- 【Ks5u發(fā)布】江蘇省徐州市2021屆高三第三次質量檢測-地理-掃描版含答案
- 【走向高考】2022屆高三物理人教版一輪復習習題:第9章-第3講電磁感應中的綜合應用
- 五年級數學(小數四則混合運算)計算題專項練習及答案
- 一年級數學(上)計算題專項練習集錦
- 四年級數學(除數是兩位數)計算題專項練習及答案
- 2023年個股期權從業(yè)人員考試(二級)真題模擬匯編(共170題)
- 第三方代付工程款協(xié)議書范本
- 烈士遺屬救助申請書
- 外研版英語九年級上冊 Module1-12作文范文
- 南京市七年級上冊地理期末試卷(含答案)
- 足球課程教學計劃工作總結
- 家具成品檢驗通用標準
- 粉末涂料有限公司成品裝車作業(yè)安全風險分級管控清單
- 諾基亞4G基站配置及常見故障處理課件
- 運輸類工作簡歷
- 煤礦施工巷道布置及支護設計方案
評論
0/150
提交評論