mirror of https://github.com/docker/docs.git
scout(policy): default non-root user
Signed-off-by: David Karlsson <35727626+dvdksn@users.noreply.github.com>
This commit is contained in:
parent
99a6f04112
commit
869a5ca74e
|
@ -61,6 +61,7 @@ Docker Scout ships the following out-of-the-box policies:
|
||||||
- [High-profile vulnerabilities](#high-profile-vulnerabilities)
|
- [High-profile vulnerabilities](#high-profile-vulnerabilities)
|
||||||
- [Supply chain attestations](#supply-chain-attestations)
|
- [Supply chain attestations](#supply-chain-attestations)
|
||||||
- [Quality gates passed](#quality-gates-passed)
|
- [Quality gates passed](#quality-gates-passed)
|
||||||
|
- [Default non-root user](#default-non-root-user)
|
||||||
|
|
||||||
Policies are enabled by default for Scout-enabled repositories. If you want to
|
Policies are enabled by default for Scout-enabled repositories. If you want to
|
||||||
customize the criteria of a policy, you can create custom policies based on the
|
customize the criteria of a policy, you can create custom policies based on the
|
||||||
|
@ -214,3 +215,27 @@ in the CLI.
|
||||||
> is enabled. Docker Scout doesn't have access to historic evaluations. Trigger
|
> is enabled. Docker Scout doesn't have access to historic evaluations. Trigger
|
||||||
> a SonarQube analysis and policy evaluation after enabling the integration to
|
> a SonarQube analysis and policy evaluation after enabling the integration to
|
||||||
> view the results in Docker Scout.
|
> view the results in Docker Scout.
|
||||||
|
|
||||||
|
### Default non-root user
|
||||||
|
|
||||||
|
By default, containers run as the `root` superuser with full system
|
||||||
|
administration privileges inside the container, unless the Dockerfile specifies
|
||||||
|
a different default user. Running containers as a privileged user weakens their
|
||||||
|
runtime security, as it means any code that runs in the container can perform
|
||||||
|
administrative actions.
|
||||||
|
|
||||||
|
The **Default non-root user** policy detects images that are set to run as the
|
||||||
|
default `root` user. To comply with this policy, images must specify a non-root
|
||||||
|
user in the image configuration. Images violate this policy if they don't
|
||||||
|
specify a non-root default user for the runtime stage.
|
||||||
|
|
||||||
|
> **Note**
|
||||||
|
>
|
||||||
|
> This policy only checks for the default user of the image, as set in the
|
||||||
|
> image configuration blob. Even if you do specify a non-root default user,
|
||||||
|
> it's still possible to override the default user at runtime, for example by
|
||||||
|
> using the `--user` flag for the `docker run` command.
|
||||||
|
|
||||||
|
To make your images compliant with this policy, use the
|
||||||
|
[`USER`](../../engine/reference/builder.md#user) Dockerfile instruction to set
|
||||||
|
a default user that doesn't have root privileges for the runtime stage.
|
||||||
|
|
Loading…
Reference in New Issue