Docker / Container Security

Iniziamo. È gratuito!
o registrati con il tuo indirizzo email
Docker / Container Security da Mind Map: Docker / Container Security

1. Incomplete segregation between Containers and Host OS, comparing to VMs

2. Container Images may pack in Malicious Codes and/or Vulnerable Libraries

3. Persistent Storage lives beyond the Container it mounts on

3.1. Deleting a Container will not delete its mounted volumes

3.2. Volume mounted on one Container (deleted or not) can be mounted on another Container.

4. Docker Daemon requires root privileges to function

5. Containerized Micro-services makes traffic patterns between given pairs of Containers more tightly defined

6. It is easier and safer to deploy patches/upgrades in containerized environment than in traditional OS-on-VM environment

7. Security Controls

7.1. Linux "cgroups"

7.2. Use "namespaces" to isolate Contains and their Host OS

7.3. Restrict which Image Registry can be used

7.4. Docker Socket can be used to "escape" the Container

7.5. Restrict running Containers with "-privileged' flag

7.6. Do not expose Docker remote REST API

7.7. Secure the Host OS

7.8. Use Istio for Access Control

7.9. Do not store secrets or API Keys in environment variables

7.10. Break privileges into capabilities

8. Security Tools

8.1. Security Assessment

8.1.1. Clair

8.1.2. Docker Bench

8.2. Security Enforcement

8.2.1. App Armor

8.2.2. Secomp