Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/stonecypher/docker_image_security_checklist
Let's make a checklist of things you're supposed to do
https://github.com/stonecypher/docker_image_security_checklist
Last synced: 21 days ago
JSON representation
Let's make a checklist of things you're supposed to do
- Host: GitHub
- URL: https://github.com/stonecypher/docker_image_security_checklist
- Owner: StoneCypher
- Created: 2019-06-18T20:23:19.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2019-07-10T16:05:03.000Z (over 5 years ago)
- Last Synced: 2024-10-26T09:53:20.416Z (2 months ago)
- Size: 4.88 KB
- Stars: 2
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# docker_image_security_checklist
Let's centralize what needs to be done for any arbitrary docker image's securityThis list regards the docker image itself. You probably also need to check other security checklists, such as the [Service security checklist](https://github.com/StoneCypher/Service_security_checklist/blob/master/README.md).
This list can then just be copy-pasta-ed into a given readme to validate the work later
## Checklist
1. [ ] Blind the docker images to anything on the network except things they need to be able to see
1. [ ] Reduce the privileges of the `docker` user
- User should only be able to read necessary dependencies outside of application code
- User should only be able to write to specific locations (tmp, log, etc.)
1. [ ] Non-public connections between microservices are all authenticated
1. [ ] Consider a `metadata reverse proxy`
* TODO: Explanation is warranted here
1. [ ] Remember to use load balancers in the fashion of firewalls
1. [ ] (not enough notes were taken) Reverse DNS
1. [ ] Be careful to extensively lock your database down
1. [ ] Set up periodic monitoring of time-limited resources like SSL certificates
1. [ ] Uptime, Health, Readiness and Resource usage monitors monitors
1. [ ] Catastrophic takeover replacement plan
1. [ ] Hard-specify your base image and avoid use of latest
1. [ ] Consider using multi-staged builds and smaller base images (alpine) to minimize attack surface## AWS specific stuff
1. [ ] Where possible, use AWS VPC
1. [ ] In Cloudtrail, set up another account unrelated to the production account
1. [ ] Logs go there, to raise the workload for an attacker hiding their tracks
1. [ ] Use a role that cannot edit logs after the fact
1. [ ] Use completely distinct authentication
1. [ ] Look into SSM as an alternative to SSH, and in that case, disable SSH