Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Docker containers shouldn't run as root #2

Open
itamarst opened this issue Jul 26, 2019 · 1 comment
Open

Docker containers shouldn't run as root #2

itamarst opened this issue Jul 26, 2019 · 1 comment

Comments

@itamarst
Copy link

itamarst commented Jul 26, 2019

Hi,

As I discuss here (https://pythonspeed.com/articles/root-capabilities-docker-security/), running Docker containers as root is a problem, opening you up to a bunch of security attacks (e.g. escalation to root on host in February 2019 CVE, which was preventable by starting as non-root user).

Could you update your best practices to note this, and your default Dockerfile to switch to a non-root user? Since your article seems pretty popular, people are no doubt using it as basis for what they build, which is fine—but it would be good if they started with something that was secure by default.

@itamarst
Copy link
Author

(fixed link above, sorry)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant