Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

i am groot takeaway... #23

Open
adespain opened this issue Oct 2, 2018 · 2 comments
Open

i am groot takeaway... #23

adespain opened this issue Oct 2, 2018 · 2 comments

Comments

@adespain
Copy link

adespain commented Oct 2, 2018

@ThatJoeMoore and @zevlag The takeaway for i am groot mentioned in the walkthrough is to not run the docker daemon as root. However from what I have read the docker daemon has to run as root correct? this challenge gave us access to a user who was already in the docker group (which gives elevated permissions already). From the CIS standards I could only find this:

1.4 Ensure only trusted users are allowed to control Docker daemon

So the takeaway isn't to make sure the docker daemon doesn't run as root, but to carefully monitor all users who are in the docker group. Or am I reading it wrong?

@zevlag
Copy link
Contributor

zevlag commented Oct 2, 2018

I agree @adespain. That is definitely a much more accurate takeaway.

The inspiration for this particular challenge was these tweet:
https://twitter.com/dinodaizovi/status/1036591829838450688
https://twitter.com/4lex/status/1035932897407115264
https://twitter.com/4lex/status/1036641246176075776

In MacOS docker itself runs in a VM, only passing in volume mounts.

In other environments it runs differently.

@zevlag
Copy link
Contributor

zevlag commented Oct 2, 2018

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants