Dangerous Defaults
Rooting for Trouble: Unmasking the Perils of Root Access in Containers!
"Unmasking Risks: Running containers as root exposes host files! 🛑 Learn why it's a bad idea with a simple example. #ContainerSecurity #DevOps"
"Unmasking Risks: Running containers as root exposes host files! 🛑 Learn why it's a bad idea with a simple example. #ContainerSecurity #DevOps"
“You look like my next mistake“ – Taylor Swift
If you have a file system mounted into the Docker container, the container’s root allows you to read host’s protected files as root. And you really don’t want that.
At CoGuard, we know that if you use containers you need to pay attention to version, correct use and configuration of the container and software running inside. We are focused on identifying risks associated with the configuration of modern software stacks including containers, cloud-native, and the applications running inside the containers. Developers are used to using code scanners and including libraries. IT/DevOps/Platform Engineering/Infrastructure typically handles the configuration. CoGuard provides automated tools that help identify the risk when new containers and applications are defined in IaC and deployed to the cloud. Get started today by understanding how your current cloud environments are configured.