• Stars
    star
    224
  • Rank 177,792 (Top 4 %)
  • Language
  • License
    Apache License 2.0
  • Created about 7 years ago
  • Updated over 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Awesome list of resources related to container security

awesome-container-security AwesomeTravis


A collection of container related security resources


Image


Deepfence Runtime Threat Mapper

  • Identify vulnerabilities in running containers, images, hosts and repositories

Dagda

  • Static image analysis tool

Port Authority Open Source Security Scanner for Docker

Understanding and Hardening Linux Containers

  • The "War and Peace" of container security

Security Assurance Requirements for Linux Application Container Deployments

  • Department of commerce guidance on container security

Dramatically Reducing Software Vulnerabilities

CoreOS Clair

OpenSCAP Container Compliance

  • Utility for aiding in compliance checks against a container

Actuary

  • Automated security profiling for Docker image
  • drydock - Inspired by docker-bench-security with the ability to apply custom security profiles
  • Docker bench security - One of the first security linting utility for Docker

Buildah

Packer

  • Packer builds Docker containers without the use of Dockerfiles. By not using Dockerfiles, Packer is able to provision containers with portable scripts or configuration management systems that are not tied to Docker in any way. It also has a simple mental model: you provision containers much the same way you provision a normal virtualized or dedicated server.

LinuxKit

  • A toolkit for building custom minimal, immutable Linux distributions

Grafeas

  • An open-source API to audit and govern your software supply chain

Atomic Reactor

  • Python library that extends docker build. It's part of the RedHat Atomic project so its rather opinionated

Containers Internals Lab

  • A series of exercises that provide a deep dive into the internals of containers. Also has a good SELinux training component

Anchore

  • Free image scanning service with a commercial offering similar to Docker Cloud
  • anchore-cli

Alpine CVE Check

  • Specialized CVE scanner

Banyan Collector: A framework to peek inside containers

  • Framework for peering inside docker images. Useful for rolling your own image scanning system

Commercial solutions


Build Management


Habitat.sh

  • Source to deployment framework. An alternative to Kubernetes and Spinnaker. I include it here because it implements a concept of trusted images and dependency management

Commercial solutions

  • Project Atomic - RedHat's complete container solution with strong built-in security
  • Docker Cloud - Continuous scanning of images along with a trust mechanism

Networking/Runtime


kubeadm

  • Associating Amazon IAM roles to pods

kiam

  • Also for associating Amazon IAM roles to pods

Secure Container Isolation: Problem Statement & Solution Space

  • Comprehensive guide from Google engineers on securing and isolating containers

gVisor

  • User-space kernel designed to provide better isolation/sandboxing of containers

Cilium

Linux Monitoring at Scale with eBPF (Brendan Gregg & Alex Maestretti)

  • bSides SF 2017 talk about container monitoring at Netflix using eBPF

Calico

  • Security enforcement for Flannel SDN

Kube2IAM

  • Apply Amazon Identity Management roles to Kubernetes Pods

Envoy

  • Sidecar and security enforcement system used at Lyft

Romana

  • Network policy enforcement
  • Project

Scope

  • Realtime metrics gathering across the cluster

Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud

  • An exploration of covert channels

Setting the Record Straight: containers vs. Zones vs. Jails vs. VMs

  • Contains an interesting point about how contains that share network namespaces can snoop on eachother's traffic

Docker Layer 2 ICC Bug

  • Containers are able to send raw ethernet frames to other containers with inter-container communication disabled

Commercial solutions

  • StakRox - Container security solution with adaptive threat protection
  • NeuVector - Continuous network security
  • TwistLock - Network activity profiling

Security profiles


bane

  • AppArmor profile generator for Docker containers

Container security as explained by the three pigs

SELinux for Mere Mortals

  • A gentle introduction to Security Enhanced Linux

SELinux is no Longer an Option

Firejail

  • Linux namespaces and seccomp-bpf sandbox. Also works with GUI apps

Docker SELinux Capabilities reference

  • A handy list of capabilities that are enabled by default in Docker

Detailed post about SELinux Capabilities

  • An SELinux deep dive

What capabilities do I really need in my container?

  • Blog post about figuring out what capabilities a container needs

Secure Your Containers with this One Weird Trick

  • Spoiler, its using SELinux

Falco

Getting towards real sandbox containers

Bubblewrap

Subgraph

  • Bills itself as an adversary resistant computing platform. Under the hood the idea is to run containers in user space

Linux Containers in 500 Lines of Code

  • An exercise that also takes you through the nitty gritty details of capabilities management

Exploits


Threat Alert: Kinsing Malware Attacks Targeting Container Environments

  • From the intro: "We’ve been tracking an organized attack campaign that targets misconfigured open Docker Daemon API ports. This persistent campaign has been going on for months, with thousands of attempts taking place nearly on a daily basis."

harpoon

  • Post exploitation framework

waitid

nsenter

  • This isn't an exploit but it allows user to access the host VM if run in privileged mode

Dirty COW

Docker CVE List

  • List of known security vulnerabilities for Docker

Three Overlooked Lessons about Container Security

  • Outlines an interesting spear-phishing attack on image maintainers

Docker Scan

  • Image scanning system with a red-team focus of exploitation

Twitter Vine Source Code Dump

  • A case study of a vulnerable private registry

Honeypots


How I capture and monitor Wordpress attacks

  • Capturing exploit attempts by emulating a Wordpress box

DShield

  • Docker container running cowrie with DShield output enabled

Dockerpot

  • Fairly old but a great idea for platform to build honeypots

Presentations/Posts


Pets, cattle and insects

  • An extension of the helpful cattle and pets analogy

Capability based sandboxing

  • The author presents the intreaging notion of applying the microservices approach to containers where you divide an application apart by capabilities
  • Awesome Object Capabilities - A language-level implementation of the capability based sandboxing methodology
  • Linux port of Capsicum related to this LWN post

Introduction to Container Security

GoDaddy's Production Kubernetes Story & Moving Target Defense in Container Envs

Container Security Round Table

Secure Substrate: Least Privilege Container Deployment

A Docker Image Walks Into a Notary

How Secure Are Your Docker Images?

Docker Security Deep Dive - Docker Track

  • Securing the image pipeline from creation to delivery

Scaling Application Defense with Intent Based Security - Michael Withrow (Twistlock)

  • A security model to match the deployment model of many orchestration utilities

Container Performance Analysis

  • Container performance analysis at Netflix. This contains similar material as the bSides talk listed above with
  • Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.

Docker Networking in Production at Visa

  • Chief Systems Architect Sasi Kannappan describes how Docker is used at Visa

The Golden Ticket- Docker and High Security Microservices - Black Belt Track

Docker Engine Security Cheatsheet

  • Collection of resources on hardening your Docker daemon

Dance Madly on the Lip of a Volcano

  • Balancing moving fast and breaking things with securing against vulnerabilities

Making Security Invisible - Jessica Frazelle - JOTB17

  • Great presentation on sandboxing containers

Vulnerability Exploitation In Docker Container Environments

Docker Security Best Practices

Kubernetes Security Best Practices

More Repositories

1

osx-security-awesome

A collection of OSX and iOS security resources
681
star
2

mandrill-php

PHP library to interface with MailChimp's Mandrill API
PHP
78
star
3

container-security-awesome

15
star
4

homebrew-infosec

Homebrew packages for information security tasks
Ruby
11
star
5

diy-jarvis

This repository contains the elements and notes for creating your own Voice Assistant system
Go
10
star
6

mandrill-node

a node.js library for interfacing with MailChimp's Mandrill API
JavaScript
8
star
7

awesome-cspm

Awesome assortment of resources about cloud security posture management
7
star
8

audio-security-awesome

Assortment of resources related to audio security
5
star
9

text2speech

Latest pre-trained model of Mozilla's TTS project
Python
4
star
10

restcraft-back

A nodejs wrapper for Minecraft server which provides a simple REST interface for issuing commands and receiving server log output via websocket
JavaScript
2
star
11

simple-scala-mapreduce

Simple Scala+Maven Map Reduce Job with DistributedCache and unit test
Scala
2
star
12

pupy-docker

Docker container for pupy remote access tool
2
star
13

securityonion-docker

2
star
14

roshe

Open source survey and data collection application
JavaScript
2
star
15

node-cruisecontrol

utility for processing a work queue with a backoff triggered by system resources
JavaScript
1
star
16

go-zartan

Voice style transfer using go
1
star
17

gophernotes-audio-ml

Gophernotes focused on audio machine learning
Jupyter Notebook
1
star
18

nifi-binarygrpc

Custom processor for Nifi that supports sending complete flowfiles (attributes and content) to a gRPC service and retrieving a complete flowfile in response.
Java
1
star
19

zerowine-docker

Docker container for the zerowine malware dynamic analysis system
1
star
20

cloudflare-ddns

Simple utility to create/update an A record pointing to the external IP of wherever the container is run
Go
1
star
21

church-heatmap

Source code to my heatmap proof of concept
JavaScript
1
star
22

jpoxy

Automatically exported from code.google.com/p/jpoxy
Java
1
star
23

Werx-JSON-RPC

Java JSON-RPC implementation designed to wrap POJOs and serve their public methods via JSON-RPC 2.0 protocol..
1
star
24

anakrino

JavaScript
1
star
25

patois-app

Mobile application for displaying obscure and lost English words
Dart
1
star