TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Container security best practices: Ultimate guide

221 pointsby knoxa2511over 3 years ago

8 comments

OrvalWintermuteover 3 years ago
Unfortunately, this reads like a 100 foot marketing document for Sysdig, not actual container security best practices.<p>If you want to look at actual container security best practices, check out CIS [1] &amp; DISA [2], and NSA [3], with some theory at NIST [4], as well as the documentation from your preferred cloud vendors, be it AWS, Azure, GCP, or other, as well as the specific container security practices.<p>[1] <a href="https:&#x2F;&#x2F;www.cisecurity.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cisecurity.org&#x2F;</a><p>[2] <a href="https:&#x2F;&#x2F;public.cyber.mil&#x2F;stigs&#x2F;downloads&#x2F;" rel="nofollow">https:&#x2F;&#x2F;public.cyber.mil&#x2F;stigs&#x2F;downloads&#x2F;</a><p>[3] <a href="https:&#x2F;&#x2F;media.defense.gov&#x2F;2021&#x2F;Aug&#x2F;03&#x2F;2002820425&#x2F;-1&#x2F;-1&#x2F;0&#x2F;CTR_KUBERNETES%20HARDENING%20GUIDANCE.PDF" rel="nofollow">https:&#x2F;&#x2F;media.defense.gov&#x2F;2021&#x2F;Aug&#x2F;03&#x2F;2002820425&#x2F;-1&#x2F;-1&#x2F;0&#x2F;CTR...</a><p>[4] <a href="https:&#x2F;&#x2F;nvlpubs.nist.gov&#x2F;nistpubs&#x2F;SpecialPublications&#x2F;NIST.SP.800-190.pdf" rel="nofollow">https:&#x2F;&#x2F;nvlpubs.nist.gov&#x2F;nistpubs&#x2F;SpecialPublications&#x2F;NIST.S...</a>
评论 #28855361 未加载
评论 #28858116 未加载
评论 #28856182 未加载
评论 #28856842 未加载
评论 #28860066 未加载
评论 #28855924 未加载
dpeduover 3 years ago
Perhaps I overlooked it, but it seems strange there&#x27;s nothing about making containers immutable and read-only. This is a powerful tool IMO.<p><a href="https:&#x2F;&#x2F;cloud.google.com&#x2F;architecture&#x2F;best-practices-for-operating-containers#ensure_that_your_containers_are_stateless_and_immutable" rel="nofollow">https:&#x2F;&#x2F;cloud.google.com&#x2F;architecture&#x2F;best-practices-for-ope...</a>
评论 #28855553 未加载
评论 #28856493 未加载
评论 #28855587 未加载
w7over 3 years ago
My home k8s cluster is now &quot;locked down&quot; using micro-vms (kata-containers[0]), pod level firewalling (cilium[1]), permission-limited container users, mostly immutable environments, and distroless[2] base images (not even a shell is inside!). Given how quickly I rolled this out; the tools to enhance cluster environment security seem more accessible now than my previous research a few years ago.<p>I know it&#x27;s not exactly a production setup, but I really do feel that it&#x27;s atleast the most secure runtime environment I&#x27;ve ever had accessible at home. Probably more so than my desktops, which you could argue undermines most of my effort, but I like to think I&#x27;m pretty careful.<p>In the beginning I was very skeptical, but being able to just build a docker&#x2F;OCI image and then manage its relationships with other services with &quot;one pane of glass&quot; that I can commit to git is so much simpler to me than my previous workflows. My previous setup involved messing with a bunch of tools like packer, cloud-init, terraform, ansible, libvirt, whatever firewall frontend was on the OS, and occasionally sshing in for anything not covered. And now I can feel even more comfortable than when I was running a traditional VM+VLAN per exposed service.<p>[0] <a href="https:&#x2F;&#x2F;github.com&#x2F;kata-containers&#x2F;kata-containers" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;kata-containers&#x2F;kata-containers</a><p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;cilium&#x2F;cilium" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;cilium&#x2F;cilium</a><p>[2] <a href="https:&#x2F;&#x2F;github.com&#x2F;GoogleContainerTools&#x2F;distroless" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;GoogleContainerTools&#x2F;distroless</a>
评论 #28889365 未加载
评论 #28859619 未加载
eatonphilover 3 years ago
The thing that kills me about all of this is how hard it is to do it right. I wish there were a dumbed down version of containers and orchestrators for people trying to do basic multi-tenant compute in a SaaS and don&#x27;t care a ton about the best performance.<p>Would I be generally ok if I use gvisor to give a shell environment to customers and just keep the host up to date?<p>Or is using containers just relatively pointless for multitenant compute in a SaaS compared to giving customers virtual machines?<p>If you can&#x27;t imagine the kind of SaaS I&#x27;m talking about, think something along the lines of Github&#x27;s new online IDE, CodeSpaces.
评论 #28857923 未加载
评论 #28857377 未加载
评论 #28856889 未加载
评论 #28858290 未加载
评论 #28857327 未加载
hsbauauvhabzbover 3 years ago
Calling your guide the ‘ultimate guide’ is disingenuous marketing. No single guide can cover all security concepts in all contexts. Every time I see that sorta wording I just assume the writer doesn’t actually know what they’re talking about
评论 #28858383 未加载
gui77aumeover 3 years ago
I&#x27;m always a bit confused about the CPU limit (for the pod), some guides (and tools) advice to always set one, but this one [0] doesn&#x27;t. Ops people I worked with almost always want to lower that limit and I have to insist for raising it (no way they disable it). Is there an ultimate best practice for that?<p>[0] <a href="https:&#x2F;&#x2F;learnk8s.io&#x2F;production-best-practices" rel="nofollow">https:&#x2F;&#x2F;learnk8s.io&#x2F;production-best-practices</a>
评论 #28857954 未加载
danjcover 3 years ago
Curious to know whether anyone here can speak to how much safer Hyper V isolation[1] is than process isolation and whether it negates some of the concerns in the article.<p>1. <a href="https:&#x2F;&#x2F;docs.microsoft.com&#x2F;en-us&#x2F;virtualization&#x2F;windowscontainers&#x2F;manage-containers&#x2F;hyperv-container" rel="nofollow">https:&#x2F;&#x2F;docs.microsoft.com&#x2F;en-us&#x2F;virtualization&#x2F;windowsconta...</a>
评论 #28856428 未加载
评论 #28855593 未加载
badrabbitover 3 years ago
Production host root fs should be mounted ro. Check out Linux IMA and how to only allow specific executables by hash. Centrally forward container logs. Use a VCS for container&#x2F;workload templates and routinely audit for misconfig. Sysdig&#x2F;falco and related tools are nice, but containers and their prod hosts are easier to harden