Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Encourage security-awareness when using Docker #164

Open
fungs opened this issue Jun 30, 2015 · 3 comments
Open

Encourage security-awareness when using Docker #164

fungs opened this issue Jun 30, 2015 · 3 comments

Comments

@fungs
Copy link
Member

fungs commented Jun 30, 2015

Pulling a Docker container means installing foreign code on your local machine. This means that malicious or defective programs can

  • compromise your network if network access is given to the container
  • compromise your data if file access is granted to the host system
  • compromise your system by deploying security issues in the Docker/LXC design

This means that in the future we should follow best practices for Docker implementations when

  • we call docker containers using docker run
  • we provide code to run inside the container or provide base images

A recent list of suggestions is compiled at http://linux-audit.com/docker-security-best-practices-for-your-vessel-and-containers/

@michaelbarton
Copy link
Contributor

michaelbarton commented Jul 1, 2015 via email

@fungs
Copy link
Member Author

fungs commented Jul 1, 2015

Could you provide some examples of how we might encourage better security for users of bioboxes?

Following the cited guidelines, one could for instance

  1. give recommendations how to run and not to run containers,
  2. restrict network access by default,
  3. use a distinct UNIX user and group in the container and map that to the current user ID

Maybe these are not urgent at the moment, since the techniques are still emerging and we have still few users, but they should be considered alongside the development of the bioboxes command line tools (aka wrapper or caller).

@fungs
Copy link
Member Author

fungs commented Feb 8, 2016

Guidelines how to build secure Docker containers.
https://youtu.be/LmUw2H6JgJo

As of version 1.10, there is a user mapping feature in Docker. This means, that the container root can be some other user on the host.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants