8 Best Practices for Docker Host Security
8 Best Practices for Docker Host Security
Running Docker Containers with an Unprivileged User
RUN groupadd -r <USER> && useradd -r -g <GROUP> <USER>FROM ubuntu:18.04
LABEL maintainer="Akuma"
RUN groupadd -r akuma && useradd -r -g akuma akuma
RUN chsh -s /usr/sbin/nologin root
# Environment Variables
ENV HOME /root
ENV DEBIAN_FRONTEND=noninteractivePreventing Privilege Escalation Attacks
Limiting Docker Container Kernel Capabilities
File System Permissions and Access
Disabling Inter-Container Communication
Auditing Docker Security
Secure the Docker Host

lynis
secure via ssh.config
secure via auditd
Securing The Docker Daemon

Part 2 Alexis course in PDF
Last updated