Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/zuBux/drydock

drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templates
https://github.com/zuBux/drydock

audit docker security

Last synced: about 2 months ago
JSON representation

drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templates

Awesome Lists containing this project

README

        

#What is drydock?

NOTICE: Development is temporarily slowed down due to involvement with Docker's [Actuary](https://github.com/diogomonica/actuary). Feel free to make PRs, I will review ASAP, and be patient for updates :)

**drydock** is a Docker security audit tool written in Python. It was initially inspired by [docker-bench-security](https://github.com/docker/docker-bench-security) but aims to provide a more flexible way for assesing Docker installations and deployments. drydock allows easy creation and use of **custom audit profiles** in order to eliminate noise and false alarms. Reports are saved in JSON format for easier parsing. drydock makes heavy use of [docker-py](https://github.com/docker/docker-py) client API to communicate with Docker.

At the moment all of the security checks performed are based on the [CIS Docker 1.6 Benchmark](https://benchmarks.cisecurity.org/tools2/docker/CIS_Docker_1.6_Benchmark_v1.0.0.pdf).

## Usage
Using drydock is as simple as :

```sh
git clone https://github.com/zuBux/drydock.git
pip install -r requirements.txt
python drydock.py
```
A profile containing all checks is provided in conf/default.yaml and can be used as reference for creating custom profiles. You can disable an audit by commenting it out (and its options, if any).

Since there are audits which require administrative privileges (e.x examining auditd rules) **users are advised to run drydock as root** for more accurate results.

### Local Docker host
Assuming that your Docker daemon uses unix sockets (default configuration), the following options are available:

* -o : Specifies the path where JSON output will be saved. Switches to output.json if none specified.
* -p : The profile which will be used for the audit. Switches to conf/default.yaml if none specified.
* -v : Use values 1, 2 or 3 to change verbosity level to ERROR, WARNING or DEBUG accordingly. Default is 1
* -f : Output format. Supports JSON (-f json) and JUnit XML (-f xml). Default is JSON
Example:
```
python drydock.py -o audit_aws -f xml -p conf/myprofile.yml -v 2
```
### Remote Docker host
If your Docker daemon listens on an exposed port, using TLS, you must provide the following :

* -d <*IP:port*> Docker daemon IP and listening port
* -c <*path*> Client certificate
* -k <*path*> Client certificate key

Example:
```
python drydock.py -d 10.0.0.2:2736 -c /home/user/cert/cert.pem -k /home/user/cert/cert.key -o audit_remote -p conf/myprofile.yml
```
## TODO
- Migrate checks to CIS Docker 1.11 Benchmark

## Contributions
drydock is in beta stage and **needs testing under different environments** (currently tested only on Ubuntu/Debian deployments). All contributions ( bugs/improvements/suggestions etc. ) are welcome!