Docker - Security

Attack Docker exposed API

Common Security Issues Inside Public Docker Images

Don’t leak sensitive information to docker images

Find, fix and monitor for open source vulnerabilities

Least privileged user

Prefer minimal base images

Run Docker As Non-root User

Sign and verify images to mitigate MITM attacks

Use a linter

Use COPY instead of ADD

Use fixed tags for immutability

Use labels for metadata

Use multi-stage builds for small secure images


References

https://snyk.io/