Nathan McCauley

Your Software is Safer in Docker Containers

The Docker security philosophy is Secure by Default. Meaning security should be inherent in the platform for all applications and not a separate solution that needs to be deployed, configured and integrated.

Today, Docker Engine supports all of the isolation features available in the Linux kernel. Not only that, but we’ve supported a simple user experience by implementing default configurations that provide greater protection for applications running within the Docker Engine, making strong security default for all containerized applications while still leaving the controls with the admin to change configurations and policies as needed.

But don’t take our word for it.  Two independent groups have evaluated Docker Engine for you and recently released statements about the inherent security value of Docker.

Gartner analyst Joerg Fritsch recently published a new paper titled How to Secure Docker Containers in Operation on this blog post.  In it Fritsch states the following:

“Gartner asserts that applications deployed in containers are more secure than applications deployed on the bare OS” because even if a container is cracked “they greatly limit the damage of a successful compromise because applications and users are isolated on a per-container basis so that they cannot compromise other containers or the host OS”.

Additionally, NCC Group contrasted the security features and defaults of container platforms and published the findings in the paper “Understanding and Hardening Linux Containers.” Included is an examination of attack surfaces, threats, related hardening features, a contrast of different defaults and recommendations across different container platforms. A key takeaway from this examination is the recommendation that applications are more secure by running in some form of Linux container than without.

Containers offer many overall advantages. From a security perspective, they create a method to reduce attack surfaces and isolate applications to only the required components, interfaces, libraries and network connections.”

“In this modern age, I believe that there is little excuse for not running a Linux application in some form of a Linux container, MAC or lightweight sandbox.”

– Aaron Grattafiori, NCC Group

The chart below depicts the outcome of the security evaluation of three container platforms.  Docker Engine was found to have a more comprehensive feature set with strong defaults.

 

Docker security

Source: Understanding and Hardening Linux Containers

The Docker security philosophy of “Secure by Default” spans across the concepts of secure platform, secure content and secure access to deliver a modern software supply chain for the enterprise that is fundamentally secure.  Built on a secure foundation with support for every Linux isolation feature, Docker Datacenter delivers additional features like application scanning, signing, role based access control (RBAC) and secure cluster configurations for complete lifecycle security. Leading enterprises like ADP trust Docker Datacenter to help harden the containers that process paychecks, manage benefits and store the most sensitive data for millions of employees across thousands of employers.

More Resources:


 

Learn More about Docker

, , , , , , , , ,

Nathan McCauley

Your Software is Safer in Docker Containers


2 Responses to “Your Software is Safer in Docker Containers”

  1. fei

    Hi Nathan, this is good, thanks for sharing. I agree at some areas container is more secure than VM. But I think it's not simply yes or no type of answer, container does bring in new attacking surfaces as one example, if we look at all places security need to concern, there are areas that container is better, and there are areas VM is better. FYI. 🙂

    Reply
  2. Albert

    Hi

    On both "Webinar Q&A: Scanning Images And Ensuring Secure Content With Docker Security Scanning" and "Docker Security Scanning Safeguards The Container Content Lifecycle" it is said that Doker Scanning and Bench will soon be available for Docker Datacenter

    After seeing the DockerCon16 ADP keynote I assume Docker Scanning and Bench are already available for Docker DataCenter?

    Is Docker DataCenter checking for integrity and scanning public registries suchs Docker, Amazon, Google, Microsoft,…?

    Is it possible to run Docker Scanning and Bench on OpenShift by means of Atomic?

    http://developers.redhat.com/blog/2016/05/02/introducing-atomic-scan-container-vulnerability-detection/
    https://www.redhat.com/en/about/press-releases/red-hat-delivers-more-secure-containers-new-scanning-capability

    Many thanks

    Reply

Leave a Reply

Get the Latest Docker News by Email

Docker Weekly is a newsletter with the latest content on Docker and the agenda for the upcoming weeks.