+ All Categories
Home > Technology > Docker security configuration

Docker security configuration

Date post: 13-Apr-2017
Category:
Upload: john-kinsella
View: 95 times
Download: 0 times
Share this document with a friend
20
DOCKER SECURITY CONFIGURATION Real-World Examples and Troubleshooting
Transcript
Page 1: Docker security configuration

DOCKER SECURITY CONFIGURATIONReal-World Examples and Troubleshooting

Page 2: Docker security configuration

OVERVIEW Capabilities

Seccomp

Demo demo demo!

Page 3: Docker security configuration

THEME

None of my demos should “work” the first time.

Page 4: Docker security configuration

CAPABILITIESWorst to best:

Run with --privileged=true

Run with –cap-add ALL

Run with --cap-drop ALL --cap-add <only needed>

Run as non-root user, unprivileged

Useful: capabilities section of https://docs.docker.com/engine/reference/run/

Page 5: Docker security configuration

DEMO SECTION ONE

Page 6: Docker security configuration

REMEMBER THIS?From my Monday talk. Even in dev you should do this. Break the bad habit.

Do as I say, not as I do!

Page 7: Docker security configuration

SECCOMP3 sections:

Default Action Target architectures Filter rules

Like firewall rules, but harder to debug!

Page 8: Docker security configuration

DEMO SECTION TWO

Page 9: Docker security configuration

SECCOMP RETURN VALUES SECCOMP_RET_KILL SECCOMP_RET_TRAP SECCOMP_RET_ERRNO SECCOMP_RET_TRACE SECCOMP_RET_ALLOW

Page 10: Docker security configuration

SECCOMP RETURN VALUES SECCOMP_RET_KILL SECCOMP_RET_TRAP SECCOMP_RET_ERRNO SECCOMP_RET_TRACE SECCOMP_RET_ALLOW

https://www.kernel.org/doc/Documentation/prctl/seccomp_filter.txt

Page 11: Docker security configuration

DOCKER SECCOMP ACTIONS SECCOMP_RET_KILL SECCOMP_RET_TRAP SECCOMP_RET_ERRNO SCMP_ACT_ERRNO SECCOMP_RET_TRACE SECCOMP_RET_ALLOW SCMP_ACT_ALLOW

https://www.kernel.org/doc/Documentation/prctl/seccomp_filter.txt

Page 12: Docker security configuration

HOW TO BUILD A SECCOMP PROFILE?We need to build a list of system calls called by the program…

…that we want to succeed

Guess (preferably educated) RTFM (thanks John!) Capture behavior – maybe /usr/sbin/strace Disassembly?

Page 13: Docker security configuration

DEMO SECTION THREE

Page 14: Docker security configuration

LAW OF DIMINISHING RETURNSGetting that last 1% can be expensive

Page 15: Docker security configuration

DEMO SECTION FOUR

Page 16: Docker security configuration

SET IT AND FORGET IT! no-new-privileges

Page 17: Docker security configuration

TOOLS Modern OS objdump (from binutils) nm strace auditd (some day…)

Page 19: Docker security configuration

WAS THIS USEFUL? @johnlkinsella

http://layeredinsight.com

http://github.com/jlk


Recommended