Since Docker’s release in 2013, several vulnerabilities have been discovered that could lead to privilege escalation and arbitrary code execution. In our Docker Security and Containerization Report, we review and highlight the top 5 vulnerabilities from high to critical severity.
Container Security and Risks
Based on interviews with developers who use Docker in their software deployment process, and the vulnerabilities discussed in our Docker security report (bypasses, privilege escalation, denial of service, and code execution), summarized below are the top 5 risks inherent across container deployment and maintenance in an organization’s IT environment.
1. UNSECURED COMMUNICATION AND UNRESTRICTED NETWORK TRAFFIC
By default, in some versions of Docker, all network traffic is allowed between containers on the same host. This increases the risk of unintended and unwanted disclosure of information to other containers. Developers should only allow intercommunication that is necessary by linking specific containers. This will significantly reduce attack (Read more...)
This is a Security Bloggers Network syndicated blog post authored by Jacqueline von Ogden. Read the original post at: Cimcor Blog