run groupadd r user useradd r g user user user user
play

RUN groupadd -r user && useradd -r -g user user USER user $ - PowerPoint PPT Presentation

RUN groupadd -r user && useradd -r -g user user USER user $ docker run --read-only debian touch x touch: cannot touch 'x': Read-only file system $ docker run -v $(pwd)/secrets:/secrets:ro \ debian touch /secrets/x touch: cannot touch


  1. RUN groupadd -r user && useradd -r -g user user USER user

  2. $ docker run --read-only debian touch x touch: cannot touch 'x': Read-only file system

  3. $ docker run -v $(pwd)/secrets:/secrets:ro \ debian touch /secrets/x touch: cannot touch '/secrets/x': Read-only file system

  4. $ docker run --cap-drop SETUID --cap-drop SETGID myimage $ docker run --cap-drop ALL --cap-add ...

  5. $ docker run -d myimage $ docker run -d -c 512 myimage $ docker run -d -c 512 myimage

  6. $ docker run -m 512m myimage

  7. $ docker run debian \ find / -perm +6000 -type f -exec ls -ld {} \; 2> /dev/null -rwsr-xr-x 1 root root 10248 Apr 15 00:02 /usr/lib/pt_chown -rwxr-sr-x 1 root shadow 62272 Nov 20 2014 /usr/bin/chage -rwsr-xr-x 1 root root 75376 Nov 20 2014 /usr/bin/gpasswd -rwsr-xr-x 1 root root 53616 Nov 20 2014 /usr/bin/chfn ...

  8. FROM debian:wheezy RUN find / -perm +6000 -type f -exec chmod a-s {} \; \ || true

  9. $ docker build -t defanged-debian . ... Successfully built 526744cf1bc1 $ docker run --rm defanged-debian \ find / -perm +6000 -type f -exec ls -ld {} \; \ 2> /dev/null | wc -l 0 $

  10. $ docker daemon --icc=false

  11. $ docker daemon --icc=false --iptables

  12. $ docker run -e API_TOKEN=MY_SECRET myimage

  13. $ docker run -e API_TOKEN=MY_SECRET myimage

  14. $ docker run -e API_TOKEN=MY_SECRET myimage

  15. $ docker run -e API_TOKEN=MY_SECRET myimage

  16. $ docker run -e API_TOKEN=MY_SECRET myimage

  17. $ docker run -v /secretdir/keyfile:/keyfile:ro myimage $ docker run --volumes-from my-secret-container myimage

  18. $ docker run -v /secretdir/keyfile:/keyfile:ro myimage $ docker run --volumes-from my-secret-container myimage

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend