Skip to content

y0shimitsugh0st84/ecape

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 

Repository files navigation

Docker Security Checklist

For a more thorough checklist please refer to the latest Docker CIS benchmark

Patching

  • Ensure you patch your Docker daemon/containerd etc to protect against escape CVEs such as
    • CVE-2019-5736
    • CVE-2019-14271
    • CVE-2020–15257
  • Follow appropriate Docker security updates

Image security

  • Conduct image vulnerability scanning using an appropriate scanner such as Anchore, Claire or Trivy.
  • Use only trusted images and consider utilising Docker content trust

Runtime security

  • Do not run containers as root users
  • Utilise user namespaces
  • Do not use host network mode.
  • Do not use privileged mode.
  • Drop capabilities if they're not needed
  • Do not mount the Docker unix socket in your containers (/var/run/docker.sock)
  • Consider read-only container filesystems.

Logging

  • Ensure your containers log to an appropriate log driver and ensure this is being appropriately monitored.

Daemon security

API and socket security

  • Take care to protect /var/run/docker.sock with appropriate filesystem protects.
  • Do not grant permissions to the Docker group unless you are OK with that user being root
  • Do not expose the TCP Docker socket publicly.

Docker in your CI pipeline/building images safely

  • Consider using Kaniko to build your containers in userspace.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published