UBUNTU20-CIS
amicontained
Our great sponsors
UBUNTU20-CIS | amicontained | |
---|---|---|
2 | 4 | |
172 | 947 | |
5.8% | 1.5% | |
9.0 | 0.0 | |
6 days ago | over 3 years ago | |
YAML | Go | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
UBUNTU20-CIS
-
CIS hardening scripts
Ansible role: https://github.com/ansible-lockdown/UBUNTU20-CIS
-
Ask r/kubernetes: What are you working on this week?
I'm currently also testing the Ubuntu CIS on a VM, it works great with Ubuntu 22.04. Just add 22.04 to the check in the first playbook. When proper testing verifies it's working, I'll run the playbook against my actual server (Kubernetes single-node).
amicontained
-
Is there a trick to know we're in a container?
If you want a tool based solution to this, tools like amicontained can tell you that in a container and some information about the sandbox.
-
Ask r/kubernetes: What are you working on this week?
I'm looking into SECCOMP profiles as well, but so far is seems a lot of pain for little gain. This series by Paulo Gomes is my starting point. part2 part3 testing-container.
-
Container capabilities
If you want to check the exact syscalls and caps in a container, getting a shell and using something like amicontained https://github.com/genuinetools/amicontained is a good option.
-
Hardening Docker and Kubernetes with seccomp
We made a few changes here. Namely, we changed seccompProfile section where we specify RuntimeDefault type and we also changed the image to amicontained which is a container introspection tool that will tell us which syscalls are blocked, as well as some other interesting security info.
What are some alternatives?
RHEL8-CIS - Ansible role for Red Hat 8 CIS Baseline
runtime - Kata Containers version 1.x runtime (for version 2.x see https://github.com/kata-containers/kata-containers).
CIS-Ubuntu-20.04-Ansible - Ansible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation
Lean and Mean Docker containers - Slim(toolkit): Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
RHEL7-CIS - Ansible role for Red Hat 7 CIS Baseline
kubernetes-ingress - NGINX and NGINX Plus Ingress Controllers for Kubernetes
UBUNTU18-CIS - CIS Baseline Ansible Role for Ubuntu 18
labs - This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
apparmor.d - Full set of AppArmor profiles (~ 1500 profiles)
img - Standalone, daemon-less, unprivileged Dockerfile and OCI compatible container image builder.