-
Notifications
You must be signed in to change notification settings - Fork 232
Closed as not planned
Labels
enhancementNew feature or requestNew feature or request
Description
Since Agentic Workflows support running custom MCP servers in Docker Containers, we should take advantage of the robust set of security features that container or Open Container Initiative (OCI) provides that are designed to further restrict and secure containerized applications. I'd like to write down a list of features that are in addition to #78 and github/gh-aw-mcpg#275
- Image Signing: verify that the image has not been tampered with since it was signed
- Seccomp: Filter and restrict the system calls a container can make to the host kernel
- AppArmor & SELinux: Use Mandatory Access Control (MAC) profiles to confine container actions, such as file access and network operations.
- Run as Non-Root: The best practice is to run container processes as a non-privileged user
- Linux Capabilities: We can remove all default Linux capabilities and add back only those that are strictly necessary (--cap-drop=ALL)
- Resource Limits (cgroups): Constrain CPU and memory usage to prevent Denial of Service (DoS) attacks
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request