Technologies
Technology used
Last updated
Technology used
Last updated
Docker is a lightweight and portable platform for packaging and deploying applications in containers, while Docker Compose is a tool for managing multi-container applications using declarative configuration in a YAML file.
Together, Docker and Docker Compose provide a powerful and convenient way to create, deploy and manage applications in container environments.
gVisor is a sandboxing technology for containers that provides enhanced isolation and increased security by running applications in a more controlled and minimalist environment.
It is an intermediary between the host core and the containers, providing an additional layer of isolation.
Unlike other lightweight virtualization solutions, gVisor does not use virtual machines or full guest kernels. Instead, it implements its own minimal kernel and provides Linux system call emulation for applications running in containers.
Seccomp, also known as Secure System Call Filtering Mode, is a security mechanism in Linux operating systems that restricts the system calls available to a running process.
It provides an extra layer of protection by limiting the functionality and actions a process can perform, thus reducing the potential impact of software vulnerabilities and attacks.
It is important to note that the correct installation and configuration of Seccomp requires a thorough understanding of the system calls used by an application.
Moreover, since our project involves pentest tools, it is difficult for me to define exactly what should and should not be blocked, that's why a default profile is provided for correct security without being too restrictive.
AppArmor is a security framework for Linux operating systems, designed to restrict the actions and privileges of processes. It provides Mandatory Access Control (MAC) by defining security policies based on containment profiles.
But as with seccomp, the use of AppArmor requires a thorough understanding of the containment profiles and security rules associated with each application to avoid potential compatibility or operating problems. and as our case is related to pentesting, to avoid excessive restrictions we're going to use the default profile for docker