SlideShare a Scribd company logo
Containers, Docker,
and Security:
State ofthe Union
1 / 38
Who am I?
Jérôme Petazzoni (@jpetazzo)
French software engineer living in California
Joined Docker (dotCloud) more than 4 years ago
(I was at Docker before it was cool!)
I built and scaled the dotCloud PaaS
(millions of containers, no known security issues)
I learned a few things about running containers
(in production)
2 / 38
Outline
Yesterday
Today
Tomorrow
3 / 38
Yesterday
4 / 38
Containers and Security yesterday
Last year, at LinuxCon...
"Is it safe to run applications in containers?"
5 / 38
Containers and Security yesterday
Last year, at LinuxCon...
"Is it safe to run applications in containers?"
really meant
"Can one container break out, and into another?"
6 / 38
Containers and Security yesterday
Last year, at LinuxCon...
"Is it safe to run applications in containers?"
really meant
"Can one container break out, and into another?"
Main concern: isolation
7 / 38
What was the answer?
8 / 38
What was the answer?
9 / 38
What was the answer?
"It's complicated"
Long list of recommendations
some were easy
(and automatically enforced by Docker)
some were not obvious
(and had to be enabled manually)
some were hard to deploy
(or required missing kernel features)
Video and Slides
10 / 38
How is this different today?
People still ask about container isolation
Much more frequently, they ask about
image security and provenance
They want to know:
if dockerpulldebianis what it claims to be
if jpetazzo/dindhas vulnerabilities
if a given image has been vetted by their sec team
11 / 38
Why has it changed?
Who cares about container isolation?
hosting providers (more density = more $$$)
PAAS (for rapid deployment; on-demand activation)
→ early adopters
Who doesn't care about container isolation?
people who use VMs only because autoscaling
people who would put multiple components per
machine anyway
→ second wave of users
12 / 38
Today
13 / 38
Docker and Containers Security Today
Improving what we had yesterday
(fine-grained permissions, immutable containers)
Addressing new challenges
(provenance, content verification, notary)
Defense in depth
(containers + VM)
The infosec mindset
(better upgrades, security benchmarks, policies)
14 / 38
Finer-grained permissions
Per-container ulimit
Capability reduction
--cap-drop/ --cap-add
e.g.: --cap-addnet_admin
Device access restrictions
--device(better than --privileged!)
Improved handling of LSM
(SELinux, AppArmor)
15 / 38
Smaller attack surface
Hardware management done on the host
(no kernel, drivers, device handling... in containers)
Package management is optional
(once a container is built, it doesn't need to be changed)
Minimal distros can be used
(e.g. buildroot, Alpine Linux...)
Less software = less risk
16 / 38
Immutable containers
dockerrun--read-only
(makes it impossible to entrench in a container)
Helps with vulnerability detection
(audit can be performed on offline images)
Even without --read-onlyflag:
copy-on-write prevents changes from being permanent
break a container when hacking it → it gets recycled
dockerdiffallows easy audit of changes
17 / 38
Image provenance
How can I trust dockerpulldebian?
I must trust upstream
(i.e. Debian and whoever maintains the image)
I must trust Docker Inc.
(operator of the Hub)
I must trust the transport
(between the Hub and my Docker host)
18 / 38
Image provenance
How can I trust dockerpulldebian?
I must trust upstream
(i.e. Debian and whoever maintains the image)
I must trust Docker Inc.
(operator of the Hub)
I must trust the transport
(between the Hub and my Docker host)
That's a lot of trust
19 / 38
"I don't want to trust anybody!"
If you don't trust upstream, you have to ...
stop using apt-getand yumwith public repos
rebuild everything from source
verify source integrity
(full audit + review all changes)
If you don't trust Docker Inc., you probably should ...
audit the whole Docker Engine code
audit every single patch that goes into Docker
(if you can do that ... we're looking for reviewers)
20 / 38
Security reminder
It's OK to be paranoid, but beware of:
Bumps in the carpet
(moving a problem rather than solving it)
Usability
(if security makes it hard/impossible to work,
people will work around it!)
Tinfoil hats
21 / 38
Can we trust the transport?
Registry v1 protocol had serious issues:
arbitrary layer IDs
no integrity check
(other than TLS transport integrity)
Registry v2 protocol has:
content-based layer IDs
signed image manifests
Is that enough?
22 / 38
Notary:
a better trust
framework
23 / 38
What are we trying to address?
Distributed content should be signed
Stealing a key should be hard
Stealing a key shouldn't have dire consequences
Replay attacks should be hard
(=can't serve you yesterday's vulnerable version)
Should use known models and research
Existing distribution infrastructure should be used
(=HTTP, HTTPS, FTP… are good)
Trusting Docker Hub should not be mandatory
24 / 38
Notary
Based on TUF (The Update Framework)
Sign content with offline keys
Trust thresholds (require K out of N keys)
(Stealing a key reduces signing requirements,
but doesn't break the whole model)
Guarantee freshness
Distribute signed content on (potentially insecure) servers
(leverage existing (insecure) transport and mirrors)
Enabled in Docker 1.8 by setting DOCKER_CONTENT_TRUST
25 / 38
Defense in depth
So, VM or containers?
26 / 38
Defense in depth
So, VM or containers?
VM and containers!
27 / 38
Defense in depth
So, VM or containers?
VM and containers!
Reduce number of VMs
(when security perimeter allows it)
Colocated containers are safer than colocated processes
Malicious code has to escape both layers
Docker provides an extra layer of isolation
Applications are safer with containers than without
28 / 38
The infosec mindset
Better upgrades
Accurate, actionable security benchmarks
Clear, sensible security policies
29 / 38
Better upgrades
Dockerfile= easy, fast, reliable builds and rebuilds
"But now I have 1000s of container images to upgrade!"
Yes, but that's way better than the 100s of server images
that you had before
The organizational risk is lower
(because if something goes wrong,
you have reliable rollbacks)
30 / 38
Security benchmarks
CIS (Center of Internet Security) Docker Benchmark
Docker Bench (https://dockerbench.com) :
automated assessment tool to check compliance
31 / 38
Policies
Docker Inc. (the company) and the Docker Project (open
source) have clear security guidelines
Mandatory code reviews (see CONTRIBUTING.md) to
ensure quality of code base
Quarterly security audits and pen tests of our
infrastructure
We support responsible disclosure
32 / 38
Tomorrow
33 / 38
Container security in the future
Personal predictions - not Docker Inc.'s roadmap!
34 / 38
Container security in the future
Personal predictions - not Docker Inc.'s roadmap!
Offline image audit
Hardening of immutable containers (noexec, nosuid)
Better GRSEC, PAX, LSM integration
User namespaces (eventually!)
Better default seccomp profiles
35 / 38
Last words
David Mortman at DEFCON this year:
“ A year ago, [Docker and security] was pretty horrible,
six months ago it wasn't so bad, and now it's pretty usable.
36 / 38
Resources
Docker security page
Docker security presentation at DockerCon 2015 SF
Docker Security CheatSheet
Notary on GitHub
Docker Bench for Security
37 / 38
Thanks!
Questions?
@jpetazzo
@docker
38 / 38

More Related Content

What's hot (20)

PDF
Docker Tips And Tricks at the Docker Beijing Meetup
Jérôme Petazzoni
 
PDF
Docker: automation for the rest of us
Jérôme Petazzoni
 
PPTX
Linux Container Brief for IEEE WG P2302
Boden Russell
 
PDF
Evoluation of Linux Container Virtualization
Imesh Gunaratne
 
PDF
Containers, docker, and security: state of the union (Bay Area Infracoders Me...
Jérôme Petazzoni
 
PPTX
Lxc – next gen virtualization for cloud intro (cloudexpo)
Boden Russell
 
PDF
Anatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxCon
Jérôme Petazzoni
 
PDF
Docker, Linux Containers (LXC), and security
Jérôme Petazzoni
 
PDF
Docker introduction
Layne Peng
 
PPTX
Linux containers – next gen virtualization for cloud (atl summit) ar4 3 - copy
Boden Russell
 
PDF
Microservices. Microservices everywhere! (At OSCON 2015)
Jérôme Petazzoni
 
PDF
JOSA TechTalk: Taking Docker to Production
Jordan Open Source Association
 
PDF
LXC, Docker, security: is it safe to run applications in Linux Containers?
Jérôme Petazzoni
 
PPTX
Introduction to Docker
Alan Forbes
 
PDF
Docker storage drivers by Jérôme Petazzoni
Docker, Inc.
 
PPTX
Performance characteristics of traditional v ms vs docker containers (dockerc...
Boden Russell
 
PDF
Visualising Basic Concepts of Docker
vishnu rao
 
PDF
Use the Source or Join the Dark Side: differences between Docker Community an...
Jérôme Petazzoni
 
PDF
Real-World Docker: 10 Things We've Learned
RightScale
 
PDF
Docker and Containers for Development and Deployment — SCALE12X
Jérôme Petazzoni
 
Docker Tips And Tricks at the Docker Beijing Meetup
Jérôme Petazzoni
 
Docker: automation for the rest of us
Jérôme Petazzoni
 
Linux Container Brief for IEEE WG P2302
Boden Russell
 
Evoluation of Linux Container Virtualization
Imesh Gunaratne
 
Containers, docker, and security: state of the union (Bay Area Infracoders Me...
Jérôme Petazzoni
 
Lxc – next gen virtualization for cloud intro (cloudexpo)
Boden Russell
 
Anatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxCon
Jérôme Petazzoni
 
Docker, Linux Containers (LXC), and security
Jérôme Petazzoni
 
Docker introduction
Layne Peng
 
Linux containers – next gen virtualization for cloud (atl summit) ar4 3 - copy
Boden Russell
 
Microservices. Microservices everywhere! (At OSCON 2015)
Jérôme Petazzoni
 
JOSA TechTalk: Taking Docker to Production
Jordan Open Source Association
 
LXC, Docker, security: is it safe to run applications in Linux Containers?
Jérôme Petazzoni
 
Introduction to Docker
Alan Forbes
 
Docker storage drivers by Jérôme Petazzoni
Docker, Inc.
 
Performance characteristics of traditional v ms vs docker containers (dockerc...
Boden Russell
 
Visualising Basic Concepts of Docker
vishnu rao
 
Use the Source or Join the Dark Side: differences between Docker Community an...
Jérôme Petazzoni
 
Real-World Docker: 10 Things We've Learned
RightScale
 
Docker and Containers for Development and Deployment — SCALE12X
Jérôme Petazzoni
 

Viewers also liked (19)

PDF
Optimizing Docker Images
Brian DeHamer
 
PDF
Orchestration for the rest of us
Jérôme Petazzoni
 
PDF
How to contribute to large open source projects like Docker (LinuxCon 2015)
Jérôme Petazzoni
 
PDF
Docker Non Technical Presentation
Jérôme Petazzoni
 
PDF
Immutable infrastructure with Docker and containers (GlueCon 2015)
Jérôme Petazzoni
 
PDF
From development environments to production deployments with Docker, Compose,...
Jérôme Petazzoni
 
PDF
Making DevOps Secure with Docker on Solaris (Oracle Open World, with Jesse Bu...
Jérôme Petazzoni
 
PDF
The Docker ecosystem and the future of application deployment
Jérôme Petazzoni
 
PDF
Docker : quels enjeux pour le stockage et réseau ? Paris Open Source Summit ...
Jérôme Petazzoni
 
PDF
Is Docker Secure?
Manideep Konakandla
 
PDF
Continuous delivery with Gradle
Bob Paulin
 
PPTX
6 Million Ways To Log In Docker - NYC Docker Meetup 12/17/2014
Christian Beedgen
 
PDF
Reactive Programming Models for IoT
Todd Montgomery
 
PPT
Amazon Web Services and Docker
Paolo latella
 
PDF
The Cloud Native Journey
Matt Stine
 
PDF
QCon London: Low latency Java in the real world - LMAX Exchange and the Zing JVM
Azul Systems, Inc.
 
PDF
Without Self-Service Operations, the Cloud is Just Expensive Hosting 2.0 - (a...
dev2ops
 
PDF
Containerization is more than the new Virtualization: enabling separation of ...
Jérôme Petazzoni
 
PPTX
Docker Security
BladE0341
 
Optimizing Docker Images
Brian DeHamer
 
Orchestration for the rest of us
Jérôme Petazzoni
 
How to contribute to large open source projects like Docker (LinuxCon 2015)
Jérôme Petazzoni
 
Docker Non Technical Presentation
Jérôme Petazzoni
 
Immutable infrastructure with Docker and containers (GlueCon 2015)
Jérôme Petazzoni
 
From development environments to production deployments with Docker, Compose,...
Jérôme Petazzoni
 
Making DevOps Secure with Docker on Solaris (Oracle Open World, with Jesse Bu...
Jérôme Petazzoni
 
The Docker ecosystem and the future of application deployment
Jérôme Petazzoni
 
Docker : quels enjeux pour le stockage et réseau ? Paris Open Source Summit ...
Jérôme Petazzoni
 
Is Docker Secure?
Manideep Konakandla
 
Continuous delivery with Gradle
Bob Paulin
 
6 Million Ways To Log In Docker - NYC Docker Meetup 12/17/2014
Christian Beedgen
 
Reactive Programming Models for IoT
Todd Montgomery
 
Amazon Web Services and Docker
Paolo latella
 
The Cloud Native Journey
Matt Stine
 
QCon London: Low latency Java in the real world - LMAX Exchange and the Zing JVM
Azul Systems, Inc.
 
Without Self-Service Operations, the Cloud is Just Expensive Hosting 2.0 - (a...
dev2ops
 
Containerization is more than the new Virtualization: enabling separation of ...
Jérôme Petazzoni
 
Docker Security
BladE0341
 
Ad

Similar to Containers, Docker, and Security: State Of The Union (LinuxCon and ContainerCon 2015) (20)

PDF
Docker Security and Content Trust
ehazlett
 
PDF
Container Security
Salman Baset
 
PDF
Docker Security - Secure Container Deployment on Linux
Michael Boelen
 
PDF
Container Security: How We Got Here and Where We're Going
Phil Estes
 
PDF
OSDC 2016 - Inspecting Security of Docker formatted Container Images to find ...
NETWAYS
 
PPTX
Containers and Security for DevOps
Salesforce Engineering
 
PDF
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDays Riga
 
PDF
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
OW2
 
PDF
It's 2018. Are My Containers Secure Yet!?
Phil Estes
 
PDF
Docker Containers Security
Stephane Woillez
 
PDF
How Secure Is Your Container? ContainerCon Berlin 2016
Phil Estes
 
PDF
Why Should Developers Care About Container Security?
All Things Open
 
PDF
ATO 2022 - Why should devs care about container security.pdf
Eric Smalling
 
PDF
Container Stranger Danger - Why should devs care about container security
Eric Smalling
 
PDF
Python Web Conference 2022 - Why should devs care about container security.pdf
Eric Smalling
 
PDF
Docker London: Container Security
Phil Estes
 
PPTX
Container security Familiar problems in new technology
Frank Victory
 
PDF
GDG SLK - Why should devs care about container security.pdf
James Anderson
 
PPTX
Exploring Docker Security
Patrick Kleindienst
 
PPTX
Understanding container security
John Kinsella
 
Docker Security and Content Trust
ehazlett
 
Container Security
Salman Baset
 
Docker Security - Secure Container Deployment on Linux
Michael Boelen
 
Container Security: How We Got Here and Where We're Going
Phil Estes
 
OSDC 2016 - Inspecting Security of Docker formatted Container Images to find ...
NETWAYS
 
Containers and Security for DevOps
Salesforce Engineering
 
DevOpsDaysRiga 2017: Chris Van Tuin - A DevOps State of Mind: Continuous Secu...
DevOpsDays Riga
 
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
OW2
 
It's 2018. Are My Containers Secure Yet!?
Phil Estes
 
Docker Containers Security
Stephane Woillez
 
How Secure Is Your Container? ContainerCon Berlin 2016
Phil Estes
 
Why Should Developers Care About Container Security?
All Things Open
 
ATO 2022 - Why should devs care about container security.pdf
Eric Smalling
 
Container Stranger Danger - Why should devs care about container security
Eric Smalling
 
Python Web Conference 2022 - Why should devs care about container security.pdf
Eric Smalling
 
Docker London: Container Security
Phil Estes
 
Container security Familiar problems in new technology
Frank Victory
 
GDG SLK - Why should devs care about container security.pdf
James Anderson
 
Exploring Docker Security
Patrick Kleindienst
 
Understanding container security
John Kinsella
 
Ad

More from Jérôme Petazzoni (8)

PDF
Containers, Docker, and Microservices: the Terrific Trio
Jérôme Petazzoni
 
PDF
Pipework: Software-Defined Network for Containers and Docker
Jérôme Petazzoni
 
PDF
Introduction to Docker at Glidewell Laboratories in Orange County
Jérôme Petazzoni
 
PDF
Docker en Production (Docker Paris)
Jérôme Petazzoni
 
PDF
Introduction to Docker at the Azure Meet-up in New York
Jérôme Petazzoni
 
PDF
Introduction to Docker and deployment and Azure
Jérôme Petazzoni
 
PDF
Killer Bugs From Outer Space
Jérôme Petazzoni
 
PDF
Docker 1 0 1 0 1: a Docker introduction, actualized for the stable release of...
Jérôme Petazzoni
 
Containers, Docker, and Microservices: the Terrific Trio
Jérôme Petazzoni
 
Pipework: Software-Defined Network for Containers and Docker
Jérôme Petazzoni
 
Introduction to Docker at Glidewell Laboratories in Orange County
Jérôme Petazzoni
 
Docker en Production (Docker Paris)
Jérôme Petazzoni
 
Introduction to Docker at the Azure Meet-up in New York
Jérôme Petazzoni
 
Introduction to Docker and deployment and Azure
Jérôme Petazzoni
 
Killer Bugs From Outer Space
Jérôme Petazzoni
 
Docker 1 0 1 0 1: a Docker introduction, actualized for the stable release of...
Jérôme Petazzoni
 

Recently uploaded (20)

PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
Advancing WebDriver BiDi support in WebKit
Igalia
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
DOCX
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
Advancing WebDriver BiDi support in WebKit
Igalia
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 

Containers, Docker, and Security: State Of The Union (LinuxCon and ContainerCon 2015)

  • 2. Who am I? Jérôme Petazzoni (@jpetazzo) French software engineer living in California Joined Docker (dotCloud) more than 4 years ago (I was at Docker before it was cool!) I built and scaled the dotCloud PaaS (millions of containers, no known security issues) I learned a few things about running containers (in production) 2 / 38
  • 5. Containers and Security yesterday Last year, at LinuxCon... "Is it safe to run applications in containers?" 5 / 38
  • 6. Containers and Security yesterday Last year, at LinuxCon... "Is it safe to run applications in containers?" really meant "Can one container break out, and into another?" 6 / 38
  • 7. Containers and Security yesterday Last year, at LinuxCon... "Is it safe to run applications in containers?" really meant "Can one container break out, and into another?" Main concern: isolation 7 / 38
  • 8. What was the answer? 8 / 38
  • 9. What was the answer? 9 / 38
  • 10. What was the answer? "It's complicated" Long list of recommendations some were easy (and automatically enforced by Docker) some were not obvious (and had to be enabled manually) some were hard to deploy (or required missing kernel features) Video and Slides 10 / 38
  • 11. How is this different today? People still ask about container isolation Much more frequently, they ask about image security and provenance They want to know: if dockerpulldebianis what it claims to be if jpetazzo/dindhas vulnerabilities if a given image has been vetted by their sec team 11 / 38
  • 12. Why has it changed? Who cares about container isolation? hosting providers (more density = more $$$) PAAS (for rapid deployment; on-demand activation) → early adopters Who doesn't care about container isolation? people who use VMs only because autoscaling people who would put multiple components per machine anyway → second wave of users 12 / 38
  • 14. Docker and Containers Security Today Improving what we had yesterday (fine-grained permissions, immutable containers) Addressing new challenges (provenance, content verification, notary) Defense in depth (containers + VM) The infosec mindset (better upgrades, security benchmarks, policies) 14 / 38
  • 15. Finer-grained permissions Per-container ulimit Capability reduction --cap-drop/ --cap-add e.g.: --cap-addnet_admin Device access restrictions --device(better than --privileged!) Improved handling of LSM (SELinux, AppArmor) 15 / 38
  • 16. Smaller attack surface Hardware management done on the host (no kernel, drivers, device handling... in containers) Package management is optional (once a container is built, it doesn't need to be changed) Minimal distros can be used (e.g. buildroot, Alpine Linux...) Less software = less risk 16 / 38
  • 17. Immutable containers dockerrun--read-only (makes it impossible to entrench in a container) Helps with vulnerability detection (audit can be performed on offline images) Even without --read-onlyflag: copy-on-write prevents changes from being permanent break a container when hacking it → it gets recycled dockerdiffallows easy audit of changes 17 / 38
  • 18. Image provenance How can I trust dockerpulldebian? I must trust upstream (i.e. Debian and whoever maintains the image) I must trust Docker Inc. (operator of the Hub) I must trust the transport (between the Hub and my Docker host) 18 / 38
  • 19. Image provenance How can I trust dockerpulldebian? I must trust upstream (i.e. Debian and whoever maintains the image) I must trust Docker Inc. (operator of the Hub) I must trust the transport (between the Hub and my Docker host) That's a lot of trust 19 / 38
  • 20. "I don't want to trust anybody!" If you don't trust upstream, you have to ... stop using apt-getand yumwith public repos rebuild everything from source verify source integrity (full audit + review all changes) If you don't trust Docker Inc., you probably should ... audit the whole Docker Engine code audit every single patch that goes into Docker (if you can do that ... we're looking for reviewers) 20 / 38
  • 21. Security reminder It's OK to be paranoid, but beware of: Bumps in the carpet (moving a problem rather than solving it) Usability (if security makes it hard/impossible to work, people will work around it!) Tinfoil hats 21 / 38
  • 22. Can we trust the transport? Registry v1 protocol had serious issues: arbitrary layer IDs no integrity check (other than TLS transport integrity) Registry v2 protocol has: content-based layer IDs signed image manifests Is that enough? 22 / 38
  • 24. What are we trying to address? Distributed content should be signed Stealing a key should be hard Stealing a key shouldn't have dire consequences Replay attacks should be hard (=can't serve you yesterday's vulnerable version) Should use known models and research Existing distribution infrastructure should be used (=HTTP, HTTPS, FTP… are good) Trusting Docker Hub should not be mandatory 24 / 38
  • 25. Notary Based on TUF (The Update Framework) Sign content with offline keys Trust thresholds (require K out of N keys) (Stealing a key reduces signing requirements, but doesn't break the whole model) Guarantee freshness Distribute signed content on (potentially insecure) servers (leverage existing (insecure) transport and mirrors) Enabled in Docker 1.8 by setting DOCKER_CONTENT_TRUST 25 / 38
  • 26. Defense in depth So, VM or containers? 26 / 38
  • 27. Defense in depth So, VM or containers? VM and containers! 27 / 38
  • 28. Defense in depth So, VM or containers? VM and containers! Reduce number of VMs (when security perimeter allows it) Colocated containers are safer than colocated processes Malicious code has to escape both layers Docker provides an extra layer of isolation Applications are safer with containers than without 28 / 38
  • 29. The infosec mindset Better upgrades Accurate, actionable security benchmarks Clear, sensible security policies 29 / 38
  • 30. Better upgrades Dockerfile= easy, fast, reliable builds and rebuilds "But now I have 1000s of container images to upgrade!" Yes, but that's way better than the 100s of server images that you had before The organizational risk is lower (because if something goes wrong, you have reliable rollbacks) 30 / 38
  • 31. Security benchmarks CIS (Center of Internet Security) Docker Benchmark Docker Bench (https://dockerbench.com) : automated assessment tool to check compliance 31 / 38
  • 32. Policies Docker Inc. (the company) and the Docker Project (open source) have clear security guidelines Mandatory code reviews (see CONTRIBUTING.md) to ensure quality of code base Quarterly security audits and pen tests of our infrastructure We support responsible disclosure 32 / 38
  • 34. Container security in the future Personal predictions - not Docker Inc.'s roadmap! 34 / 38
  • 35. Container security in the future Personal predictions - not Docker Inc.'s roadmap! Offline image audit Hardening of immutable containers (noexec, nosuid) Better GRSEC, PAX, LSM integration User namespaces (eventually!) Better default seccomp profiles 35 / 38
  • 36. Last words David Mortman at DEFCON this year: “ A year ago, [Docker and security] was pretty horrible, six months ago it wasn't so bad, and now it's pretty usable. 36 / 38
  • 37. Resources Docker security page Docker security presentation at DockerCon 2015 SF Docker Security CheatSheet Notary on GitHub Docker Bench for Security 37 / 38