An ongoing & curated collection of awesome software, libraries and frameworks, best guidelines and technical resources and cool stuff about Docker Security.
Docker is a software platform that allows you to build, test, and deploy applications quickly. Docker packages software into standardized units called containers that have everything the software needs to run including libraries, system tools, code, and runtime. Using Docker, you can quickly deploy and scale applications into any environment and know your code will run.
Docker containers are, by default, quite secure; especially if you run your processes as non-privileged users inside the container. You can add an extra layer of safety by enabling AppArmor, SELinux, GRSEC, or another appropriate hardening system.
- Container Security by Liz Rice
- Docker Security by Adrian Mouat
- Advanced Infrastructure Penetration Testing by Chiheb Chebbi
- OWASP Docker Security
- Introduction to Container Security Understanding the isolation properties of Docker
- Anatomy of a hack: Docker Registry
- Hunting for Insecure Docker Registries
- How Abusing Docker API Lead to Remote Code Execution
- Using Docker-in-Docker for your CI or testing environment? Think twice
- Vulnerability Exploitation in Docker Container Environments
- Mitigating High Severity RunC Vulnerability (CVE-2019-5736)
- Building Secure Docker Images - 101
- Dockerfile Security Checks using OPA Rego Policies with Conftest
- An Attacker Looks at Docker: Approaching Multi-Container Applications
- Lesson 4: Hacking Containers Like A Boss
- Best practices for building secure Docker images
- OWASP Bay Area - Attacking & Auditing Docker Containers Using Open Source tools
- DockerCon 2018 - Docker Container Security
- DokcerCon 2019 - Container Security: Theory & Practice at Netflix
- DockerCon 2019 - Hardening Docker daemon with Rootless mode
- RSAConference 2019 - How I Learned Docker Security the Hard Way (So You Don’t Have To)
- BSidesSF 2020 - Checking Your --privileged Container
- Live Container Hacking: Capture The Flag - Andrew Martin (Control Plane) vs Ben Hall (Katacoda)
- gVisor - An application kernel, written in Go, that implements a substantial portion of the Linux system surface.
- Kata Container - An open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs.
- sysbox - An open-source container runtime that enables Docker containers to act as virtual servers capable of running software such as Systemd, Docker, and Kubernetes in them. Launch inner containers, knowing that the outer container is strongly isolated from the underlying host.
- Firecracker - An open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant container and function-based services.
- trivy - A simple and comprehensive Vulnerability Scanner for Containers, suitable for CI.
- Clair - Vulnerability Static Analysis to discovering Common Vulnerability Exposure (CVE) on containers and can integrate with CI like Gitlab CI which included on their template.
- Harbor - An open source trusted cloud native registry project that equipped with several features such as RESTful API, Registry, Vulnerability Scanning, RBAC and etc.
- Anchore Engine - An open source project that provides a centralized service for inspection, analysis and certification of container images. Access the engine through a RESTful API and Anchore CLI then integrated with your CI/CD pipeline.
- grype - An open source project from Anchore to perform a vulnerability scanning for container images and filesystems.
- Dagda - A tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities.
- Synk - CLI and build-time tool to find & fix known vulnerabilities in open-source dependencies support container scanning, application security.
- Docker Bench for Security - A script that checks for dozens of common best-practices around deploying Docker containers in production.
- lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
- Open Policy Agent (OPA) - An open source, general-purpose policy engine that enables unified, context-aware policy enforcement across the entire stack.
- opa-docker-authz - A policy-enabled authorization plugin for Docker.
- Gorsair - A penetration testing tool for discovering and remotely accessing Docker APIs from vulnerable Docker containers.
- dockerscan - Docker security analysis & hacking tools with some functionalities to detect vulnerabilities in Docker images and Docker registries, the objective is the attack.
- Cloud Container Attack Tool - A tool for testing security of container environments.
- DockerSecurityPlayground (DSP) - A Microservices-based framework for the study of network security and penetration test techniques.
- Katacoda Courses: Docker Security - Learn Docker Security using Interactive Browser-Based Scenarios.
- Docker Security by Contol Plane - Learn Docker Security from Control Plane.
- Play with Docker - A simple, interactive, fun playground to learn Docker and its free.
- dive - A tool for exploring each layer in a docker image.
- hadolint - A smarter Dockerfile linter that helps you build best practice Docker images.
- dockle - Container image linter, help you to build the best practices Docker image.
- docker_auth - Authentication server for Docker Registry 2.
- bane - Custom & better AppArmor profile generator for Docker containers.
- How I Hacked Play-with-Docker and Remotely Ran Code on the Host
- A hacking group is hijacking Docker systems with exposed API endpoints
- Hundreds of Vulnerable Docker Hosts Exploited by Cryptocurrency Miners
- Cryptojacking worm compromised over 2,000 Docker hosts
- Docker API vulnerability allows hackers to mine Monero
- Docker Registry HTTP API v2 exposed in HTTP without authentication leads to docker images dumping and poisoning
- How dangerous is Request Splitting, a vulnerability in Golang or how we found the RCE in Portainer and hacked Uber
- Docker Registries Expose Hundreds of Orgs to Malware, Data Theft
- Doki Backdoor Infiltrates Docker Servers in the Cloud
- Threat Actors Now Target Docker via Container Escape Features
Your contributions are always welcome.
License
To the extent possible under law, Veilair has waived all copyright and related or neighboring rights to this work.