There was a recent post about whether to enable ufw and it made me ask: how protected I am from a rogue docker container? I have a single server with 15-20 docker containers running at any given time. Should one get hacked or be malicious from the get go, are there (hopefully easy to implement for an armchair sysadmin) best practices to mitigate such an event? Thanks!

  • hereisjames@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    You can run your containers through a vulnerability scanner like Trivy and then patch with Copacetic. It will only fix the container image’s OS vulnerabilities though, not the app code dependencies.

    Otherwise one step simpler is you can just vulnerability scan the containers, look at the issues, then decide if you want to deploy them.