docker-security-guide

🚨 CRITICAL GUIDELINES

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "docker-security-guide" with this command: npx skills add josiahsiegel/claude-plugin-marketplace/josiahsiegel-claude-plugin-marketplace-docker-security-guide

🚨 CRITICAL GUIDELINES

Windows File Path Requirements

MANDATORY: Always Use Backslashes on Windows for File Paths

When using Edit or Write tools on Windows, you MUST use backslashes (
) in file paths, NOT forward slashes (/ ).

Examples:

  • ❌ WRONG: D:/repos/project/file.tsx

  • ✅ CORRECT: D:\repos\project\file.tsx

This applies to:

  • Edit tool file_path parameter

  • Write tool file_path parameter

  • All file operations on Windows systems

Documentation Guidelines

NEVER create new documentation files unless explicitly requested by the user.

  • Priority: Update existing README.md files rather than creating new documentation

  • Repository cleanliness: Keep repository root clean - only README.md unless user requests otherwise

  • Style: Documentation should be concise, direct, and professional - avoid AI-generated tone

  • User preference: Only create additional .md files when user specifically asks for documentation

Docker Security Guide

This skill provides comprehensive security guidelines for Docker across all platforms, covering threats, mitigations, and compliance requirements.

Security Principles

Defense in Depth

Apply security at multiple layers:

  • Image security: Minimal, scanned, signed images

  • Build security: Secure build process, no secrets in layers

  • Runtime security: Restricted capabilities, resource limits

  • Network security: Isolation, least privilege

  • Host security: Hardened host OS, updated Docker daemon

  • Orchestration security: Secure configuration, RBAC

  • Monitoring: Detection, logging, alerting

Least Privilege

Grant only the minimum permissions necessary:

  • Non-root users

  • Dropped capabilities

  • Read-only filesystems

  • Minimal network exposure

  • Restricted syscalls (seccomp)

  • Limited resources

Image Security

Base Image Selection

Threat: Vulnerable or malicious base images

Mitigation:

Use official images only

FROM node:20.11.0-alpine3.19 # Official, specific version

NOT

FROM randomuser/node # Unverified source FROM node:latest # Unpredictable, can break

Verification:

Verify image source

docker image inspect node:20-alpine | grep -A 5 "Author"

Enable Docker Content Trust (image signing)

export DOCKER_CONTENT_TRUST=1 docker pull node:20-alpine

Minimal Images

Threat: Larger attack surface, more vulnerabilities

Mitigation:

Prefer minimal distributions

FROM alpine:3.19 # ~7MB FROM gcr.io/distroless/static # ~2MB FROM scratch # 0MB (for static binaries)

vs

FROM ubuntu:22.04 # ~77MB with more packages

Benefits:

  • Fewer packages = fewer vulnerabilities

  • Smaller attack surface

  • Faster downloads and starts

  • Less disk space

Micro-Distros for Security-Critical Applications (2025)

Wolfi/Chainguard Images:

  • Zero-CVE goal, SBOM included by default

  • Nightly security patches, signed with provenance

  • Available for: Node, Python, Go, Java, .NET, etc.

Usage:

Development stage (includes build tools)

FROM cgr.dev/chainguard/node:latest-dev AS builder WORKDIR /app COPY package*.json ./ RUN npm ci --only=production

Production stage (minimal, zero-CVE goal)

FROM cgr.dev/chainguard/node:latest WORKDIR /app COPY --from=builder /app/node_modules ./node_modules COPY . . USER node ENTRYPOINT ["node", "server.js"]

When to use: Security-critical apps, compliance requirements (SOC2, HIPAA, PCI-DSS), zero-trust environments, supply chain security emphasis.

See docker-best-practices skill for full image comparison table.

Vulnerability Scanning

Tools:

  • Docker Scout (built-in)

  • Trivy

  • Grype

  • Snyk

  • Clair

Process:

Scan with Docker Scout

docker scout cves IMAGE_NAME docker scout recommendations IMAGE_NAME

Scan with Trivy

trivy image IMAGE_NAME trivy image --severity HIGH,CRITICAL IMAGE_NAME

Scan Dockerfile

trivy config Dockerfile

Scan for secrets

trivy fs --scanners secret .

CI/CD Integration:

GitHub Actions example

  • name: Scan image run: | docker scout cves my-image:${{ github.sha }} trivy image --exit-code 1 --severity CRITICAL my-image:${{ github.sha }}

Multi-Stage Builds for Security

Threat: Build tools and secrets in final image

Mitigation:

Build stage with build tools

FROM golang:1.21 AS builder WORKDIR /app COPY . . RUN go build -o app

Final stage - minimal, no build tools

FROM gcr.io/distroless/base-debian11 COPY --from=builder /app/app / USER nonroot:nonroot ENTRYPOINT ["/app"]

Benefits:

  • No compiler/build tools in production image

  • Secrets used in build don't persist

  • Smaller, more secure final image

Build-Time Security

Secrets Management

NEVER:

BAD - Secret in layer history

ENV API_KEY=abc123 RUN git clone https://user:password@github.com/repo.git COPY .env /app/.env

DO:

Use BuildKit secrets

syntax=docker/dockerfile:1

FROM alpine RUN --mount=type=secret,id=github_token
git clone https://$(cat /run/secrets/github_token)@github.com/repo.git

Build with secret (not in image)

docker build --secret id=github_token,src=./token.txt .

BuildKit Frontend Security (2025)

Threat: Malicious or compromised BuildKit frontends can execute arbitrary code during build

🚨 2025 CRITICAL WARNING: BuildKit supports custom frontends (parsers) via # syntax= directive. Untrusted frontends have FULL BUILD-TIME code execution and can:

  • Steal secrets from build context

  • Modify build outputs

  • Exfiltrate data

  • Compromise the build environment

Risk Example:

🔴 DANGER - Untrusted frontend (code execution risk!)

syntax=docker/dockerfile:1@sha256:abc123...untrusted

FROM alpine RUN echo "This frontend could do anything during build"

Mitigation:

  • Only use official Docker frontends:

✅ Safe - Official Docker frontend

syntax=docker/dockerfile:1

✅ Safe - Specific version

syntax=docker/dockerfile:1.5

✅ Safe - Pinned with digest (verify from docker.com)

syntax=docker/dockerfile:1@sha256:ac85f380a63b13dfcefa89046420e1781752bab202122f8f50032edf31be0021

  • Verify frontend sources:

  • Use ONLY docker/dockerfile:* frontends

  • Pin to specific versions with SHA256 digest

  • Verify digests from official Docker documentation

  • Never use third-party frontends without thorough vetting

  • Audit all Dockerfiles for unsafe syntax directives:

Check all Dockerfiles for potentially malicious syntax directives

grep -r "^# syntax=" . --include="Dockerfile*"

Verify all frontends are official Docker images

grep -r "^# syntax=" . --include="Dockerfile*" | grep -v "docker/dockerfile"

  • BuildKit security configuration (defense in depth):

Restrict frontend sources in BuildKit config

/etc/buildkit/buildkitd.toml

[frontend."dockerfile.v0"]

Only allow official Docker frontends

allowedImages = ["docker.io/docker/dockerfile:*"]

Supply Chain Protection:

  • Treat custom frontends as HIGH RISK code execution vectors

  • Review ALL # syntax= directives in Dockerfiles before builds

  • Use content trust for frontend images

  • Monitor for frontend vulnerabilities

  • Include frontend verification in CI/CD security gates

SBOM (Software Bill of Materials) Generation (2025)

Critical 2025 Requirement: Document origin and history of all components for supply chain transparency and compliance.

Why SBOM is Mandatory:

  • Supply chain security visibility

  • Vulnerability tracking and response

  • Compliance requirements (Executive Order 14028, etc.)

  • License compliance

  • Incident response readiness

Generate SBOM with Docker Scout:

Generate SBOM for image

docker scout sbom IMAGE_NAME

Export SBOM in different formats

docker scout sbom --format spdx IMAGE_NAME > sbom.spdx.json docker scout sbom --format cyclonedx IMAGE_NAME > sbom.cyclonedx.json

Include SBOM attestation during build

⚠️ WARNING: BuildKit attestations are NOT cryptographically signed!

docker buildx build
--sbom=true
--provenance=true
--tag my-image:latest
.

View SBOM attestations (unsigned metadata only)

docker buildx imagetools inspect my-image:latest --format "{{ json .SBOM }}"

🚨 CRITICAL SECURITY LIMITATION: BuildKit attestations (--sbom=true , --provenance=true ) are NOT cryptographically signed. This means:

  • Anyone with push access can create tampered attestations

  • SBOMs can be incomplete or falsified

  • Provenance data cannot be trusted without external verification

  • For production: Use external signing tools (cosign, Notary) and Syft for SBOM generation

Generate SBOM with Syft:

Install Syft

curl -sSfL https://raw.githubusercontent.com/anchore/syft/main/install.sh | sh

Generate SBOM from image

syft my-image:latest

Generate in specific format

syft my-image:latest -o spdx-json > sbom.spdx.json syft my-image:latest -o cyclonedx-json > sbom.cyclonedx.json

Generate from Dockerfile

syft dir:. -o spdx-json > sbom.spdx.json

SBOM in CI/CD Pipeline:

GitHub Actions example

name: Build with SBOM

jobs: build: steps: - name: Build image with SBOM run: | docker buildx build
--sbom=true
--provenance=true
--tag my-image:${{ github.sha }}
--push
.

  - name: Generate SBOM with Syft
    run: |
      syft my-image:${{ github.sha }} -o spdx-json > sbom.json

  - name: Upload SBOM artifact
    uses: actions/upload-artifact@v3
    with:
      name: sbom
      path: sbom.json

  - name: Scan SBOM for vulnerabilities
    run: |
      grype sbom:sbom.json --fail-on high

SBOM Best Practices:

Generate for every image:

  • Production images: mandatory

  • Development images: recommended

  • Base images: critical

Store SBOMs with provenance:

  • Version control alongside Dockerfile

  • Artifact registry with image

  • Dedicated SBOM repository

Automate SBOM generation:

  • Integrate into CI/CD pipeline

  • Generate on every build

  • Fail builds if SBOM generation fails

Use SBOM for vulnerability management:

Scan SBOM instead of image (faster)

grype sbom:sbom.json trivy sbom sbom.json

Compare SBOMs between versions

diff <(syft old-image:1.0 -o json) <(syft new-image:2.0 -o json)

  • SBOM formats:

  • SPDX: Industry standard, ISO/IEC 5962:2021

  • CycloneDX: OWASP standard, security-focused

  • Choose based on compliance requirements

Chainguard Images with Built-in SBOM:

Chainguard images include SBOM attestation by default

docker buildx imagetools inspect cgr.dev/chainguard/node:latest

Extract SBOM

cosign download sbom cgr.dev/chainguard/node:latest > chainguard-node-sbom.json

Or use multi-stage and don't include secrets:

FROM node AS builder ARG NPM_TOKEN RUN echo "//registry.npmjs.org/:_authToken=${NPM_TOKEN}" > .npmrc &&
npm install &&
rm .npmrc # Still in layer history!

Better - secret only in build stage

FROM node AS dependencies RUN --mount=type=secret,id=npmrc,target=/root/.npmrc
npm install

FROM node AS runtime COPY --from=dependencies /app/node_modules ./node_modules

No .npmrc in final image

Secure Build Context

Threat: Sensitive files included in build context

Mitigation: Create comprehensive .dockerignore :

Secrets

.env .env.local *.key *.pem credentials.json secrets/

Version control

.git .gitignore

Cloud credentials

.aws/ .gcloud/

Private data

database.sql backups/

SSH keys

.ssh/ id_rsa id_rsa.pub

Sensitive logs

*.log logs/

Image Signing

Enable Docker Content Trust:

Enable image signing

export DOCKER_CONTENT_TRUST=1

Set up keys

docker trust key generate my-key docker trust signer add --key my-key.pub my-name my-image

Push signed image

docker push my-image:tag

Pull only signed images

docker pull my-image:tag # Fails if not signed

Runtime Security

User Privileges

Threat: Container escape via root

Mitigation:

Create and use non-root user

FROM node:20-alpine RUN addgroup -g 1001 appuser &&
adduser -S appuser -u 1001 -G appuser USER appuser WORKDIR /home/appuser/app COPY --chown=appuser:appuser . . CMD ["node", "server.js"]

Verification:

Check user in running container

docker exec container-name whoami # Should not be root docker exec container-name id # Check UID/GID

Capabilities

Threat: Excessive kernel capabilities

Default Docker capabilities:

  • CHOWN, DAC_OVERRIDE, FOWNER, FSETID

  • KILL, SETGID, SETUID, SETPCAP

  • NET_BIND_SERVICE, NET_RAW

  • SYS_CHROOT, MKNOD, AUDIT_WRITE, SETFCAP

Mitigation:

Drop all, add only needed

docker run
--cap-drop=ALL
--cap-add=NET_BIND_SERVICE
my-image

In docker-compose.yml:

services: app: cap_drop: - ALL cap_add: - NET_BIND_SERVICE

Common needed capabilities:

  • NET_BIND_SERVICE : Bind to ports < 1024

  • NET_ADMIN : Network configuration

  • SYS_TIME : Set system time

Read-Only Filesystem

Threat: Container modification, malware persistence

Mitigation:

docker run
--read-only
--tmpfs /tmp:noexec,nosuid,size=64M
--tmpfs /var/run:noexec,nosuid,size=64M
my-image

In Compose:

services: app: read_only: true tmpfs: - /tmp:noexec,nosuid,size=64M - /var/run:noexec,nosuid,size=64M

Security Options

no-new-privileges:

docker run --security-opt="no-new-privileges:true" my-image

Prevents privilege escalation via setuid/setgid binaries.

AppArmor (Linux):

docker run --security-opt="apparmor=docker-default" my-image

SELinux (Linux):

docker run --security-opt="label=type:container_runtime_t" my-image

Seccomp (syscall filtering):

Use default profile

docker run --security-opt="seccomp=default" my-image

Or custom profile

docker run --security-opt="seccomp=./seccomp-profile.json" my-image

Resource Limits

Threat: DoS via resource exhaustion

Mitigation:

docker run
--memory="512m"
--memory-swap="512m" \ # Disable swap --cpus="1.0"
--pids-limit=100
--ulimit nofile=1024:1024
my-image

In Compose:

services: app: deploy: resources: limits: cpus: '1.0' memory: 512M pids: 100 reservations: cpus: '0.5' memory: 256M ulimits: nofile: soft: 1024 hard: 1024

Comprehensive Secure Run Command

docker run
--name secure-app
--detach
--restart unless-stopped
--user 1000:1000
--cap-drop=ALL
--cap-add=NET_BIND_SERVICE
--read-only
--tmpfs /tmp:noexec,nosuid,size=64M
--security-opt="no-new-privileges:true"
--security-opt="seccomp=default"
--memory="512m"
--cpus="1.0"
--pids-limit=100
--network=isolated-network
--publish 127.0.0.1:8080:8080
--volume secure-data:/data:ro
--health-cmd="curl -f http://localhost/health || exit 1"
--health-interval=30s
my-secure-image:1.2.3

Network Security

Network Isolation

Threat: Lateral movement between containers

Mitigation:

networks: frontend: driver: bridge backend: driver: bridge internal: true # No external access

services: web: networks: - frontend

api: networks: - frontend - backend

database: networks: - backend # Isolated from frontend

Port Exposure

Threat: Unnecessary network exposure

Mitigation:

Bind to localhost only

docker run -p 127.0.0.1:8080:8080 my-image

NOT (binds to all interfaces)

docker run -p 8080:8080 my-image

In Compose:

services: app: ports: - "127.0.0.1:8080:8080" # Localhost only

Inter-Container Communication

Disable default inter-container communication

/etc/docker/daemon.json

{ "icc": false }

Then explicitly allow via networks:

services: app1: networks: - app-network app2: networks: - app-network # Can communicate with app1

networks: app-network: driver: bridge

Secrets Management

Docker Secrets (Swarm Mode)

Create secret

echo "mypassword" | docker secret create db_password -

Use in service

docker service create
--name my-service
--secret db_password
my-image

Access in container at /run/secrets/db_password

In stack file:

version: '3.8'

services: app: image: my-image secrets: - db_password

secrets: db_password: external: true

Secrets Best Practices

  • Never in environment variables (visible in docker inspect )

  • Never in images (in layer history)

  • Never in version control (Git history)

  • Mount as files with restricted permissions

  • Use secret management systems (Vault, AWS Secrets Manager, etc.)

  • Rotate regularly

Alternative: Mounted secrets:

docker run -v /secure/secrets:/run/secrets:ro my-image

Compliance & Benchmarking

CIS Docker Benchmark

Automated checking:

Clone docker-bench-security

git clone https://github.com/docker/docker-bench-security.git cd docker-bench-security sudo sh docker-bench-security.sh

Or run as container

docker run --rm --net host --pid host --userns host
--cap-add audit_control
-v /var/lib:/var/lib:ro
-v /var/run/docker.sock:/var/run/docker.sock:ro
-v /usr/lib/systemd:/usr/lib/systemd:ro
-v /etc:/etc:ro
docker/docker-bench-security

Key CIS Recommendations

Host Configuration

  • Keep Docker up to date

  • Restrict network traffic between containers

  • Set logging level to 'info'

  • Enable Docker Content Trust

Docker Daemon

  • Use TLS for Docker daemon socket

  • Don't expose daemon on TCP without TLS

  • Enable user namespace support

Docker Files

  • Verify Docker files ownership and permissions

  • Audit Docker files and directories

Container Images

  • Create user for container

  • Use trusted base images

  • Don't install unnecessary packages

Container Runtime

  • Run containers with limited privileges

  • Set resource limits

  • Don't share host network namespace

Monitoring & Detection

Logging

services: app: logging: driver: "json-file" options: max-size: "10m" max-file: "3" labels: "service,env" env: "ENV,VERSION"

Centralized logging:

services: app: logging: driver: "syslog" options: syslog-address: "tcp://log-server:514" tag: "{{.Name}}/{{.ID}}"

Runtime Monitoring

Tools:

  • Falco: Runtime security monitoring

  • Sysdig: Container visibility

  • Prometheus + cAdvisor: Metrics

  • Docker events: Real-time events

Monitor for:

  • Unexpected processes

  • File modifications

  • Network connections

  • Resource spikes

  • Failed authentication

  • Privilege escalation attempts

Monitor Docker events

docker events --filter 'type=container' --filter 'event=start'

Watch specific container

docker events --filter "container=my-container"

Runtime security with Falco

docker run --rm -it
--privileged
-v /var/run/docker.sock:/host/var/run/docker.sock
-v /dev:/host/dev
-v /proc:/host/proc:ro
falcosecurity/falco

Platform-Specific Security

Linux

User namespace remapping:

// /etc/docker/daemon.json { "userns-remap": "default" }

Benefits: Root in container → unprivileged on host

SELinux:

Enable SELinux for Docker

setenforce 1

Run with SELinux labels

docker run --security-opt label=type:svirt_sandbox_file_t my-image

Volumes with SELinux

docker run -v /host/path:/container/path:z my-image

AppArmor:

Check AppArmor status

aa-status

Run with AppArmor profile

docker run --security-opt apparmor=docker-default my-image

Windows

Hyper-V isolation:

More isolated than process isolation

docker run --isolation=hyperv my-image

Windows Defender:

  • Ensure real-time protection enabled

  • Configure exclusions carefully

  • Scan images regularly

macOS

Docker Desktop security:

  • Keep Docker Desktop updated

  • Enable "Use gRPC FUSE for file sharing"

  • Limit file sharing to necessary paths

  • Review resource allocation

Security Checklist

Image:

  • Based on official, minimal image

  • Specific version tag (not latest )

  • Scanned for vulnerabilities

  • No secrets in layers

  • Runs as non-root user

  • Signed (Content Trust)

Build:

  • .dockerignore configured

  • Multi-stage build (if applicable)

  • Build secrets handled properly

  • Build from trusted sources only

Runtime:

  • Non-root user

  • Capabilities dropped

  • Read-only filesystem (where possible)

  • Security options set

  • Resource limits configured

  • Isolated network

  • Minimal port exposure

  • Secrets mounted securely

Operations:

  • CIS benchmark compliance

  • Logging configured

  • Monitoring in place

  • Regular vulnerability scans

  • Incident response plan

  • Regular updates

  • Audit logs enabled

Common Security Mistakes

❌ NEVER:

  • Run as root

  • Use --privileged

  • Mount Docker socket (/var/run/docker.sock )

  • Hardcode secrets

  • Use latest tag

  • Skip vulnerability scanning

  • Expose unnecessary ports

  • Disable security features

  • Ignore security updates

  • Trust unverified images

✅ ALWAYS:

  • Run as non-root

  • Drop capabilities

  • Scan for vulnerabilities

  • Use secrets management

  • Tag with specific versions

  • Enable security options

  • Apply least privilege

  • Keep systems updated

  • Monitor runtime behavior

  • Use official images

This security guide represents current best practices. Security threats evolve constantly—always check the latest Docker security documentation and CVE databases.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

security-first-2025

No summary provided by upstream source.

Repository SourceNeeds Review
Security

git-security-2025

No summary provided by upstream source.

Repository SourceNeeds Review
Security

powershell-security

No summary provided by upstream source.

Repository SourceNeeds Review
General

tailwindcss-advanced-layouts

No summary provided by upstream source.

Repository SourceNeeds Review