10 Docker Security Best Practices

This page summarizes the projects mentioned and recommended in the original post on dev.to

Stream - Scalable APIs for Chat, Feeds, Moderation, & Video.
Stream helps developers build engaging apps that scale to millions with performant and flexible Chat, Feeds, Moderation, and Video APIs and SDKs powered by a global edge network and enterprise-grade infrastructure.
getstream.io
featured
InfluxDB – Built for High-Performance Time Series Workloads
InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
www.influxdata.com
featured
  1. docker-node

    Official Docker Image for Node.js :whale: :turtle: :rocket:

    If you’re developing Node.js applications, you may want to consult with the official Docker and Node.js Best Practices.

  2. Stream

    Stream - Scalable APIs for Chat, Feeds, Moderation, & Video. Stream helps developers build engaging apps that scale to millions with performant and flexible Chat, Feeds, Moderation, and Video APIs and SDKs powered by a global edge network and enterprise-grade infrastructure.

    Stream logo
  3. cli

    Snyk CLI scans and monitors your projects for security vulnerabilities. (by snyk)

    Therefore, one way of protecting against vulnerabilities in open source security software is to use tools such as Snyk, to add continuous docker security scanning and monitoring of vulnerabilities that may exist across all of the Docker image layers that are in use.

  4. cosign

    Code signing and transparency for containers and binaries

    SigStore project, including its cosign tool, implements simple signing, storage, and verification of artifacts.

  5. security-txt

    A proposed standard that allows websites to define security policies.

    It is good practice to adopt a SECURITY.TXT (RFC5785) file that points to your responsible disclosure policy for your Docker label schema when adding labels, such as the following:

  6. connaisseur

    An admission controller that integrates Container Image Signature Verification into a Kubernetes cluster

    Another thing to consider with image signatures is how you will be running the containers. For most of us, Kubernetes is our platform of choice, and it does not have native support for DCT, so unless you are using a specific distribution that implements it, you are going to need to provide some form of runtime enforcement. Fortunately, the Kubernetes admission controller API can be leveraged to do this, and open source projects like Connaisseur can take care of this for DCT / Notary v1 as well as Cosign signatures.

  7. hadolint

    Dockerfile linter, validate inline bash, written in Haskell

    One such linter is hadolint. It parses a Dockerfile and shows a warning for any errors that do not match its best practice rules.

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Are there tools that tell you if you can optimize your dockerfiles?

    5 projects | /r/docker | 8 Jul 2022
  • CONTAINER SECURITY

    3 projects | /r/u_sybrenbolandit | 31 Aug 2021
  • Dockerfile Best Practices: The Ultimate Guide to Optimizing Your Container Builds

    4 projects | dev.to | 17 Mar 2025
  • Java eclipse temurin:18.0.1_10-jre-alpine is out ! Now what ?

    2 projects | dev.to | 4 May 2022
  • Just Say No To `:Latest`

    3 projects | news.ycombinator.com | 6 Mar 2022

Did you know that Go is
the 4th most popular programming language
based on number of references?