-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New guide on container security best practices #156
Conversation
- MDX plugin to show snippets of code from external files
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Minor "here" hyperlink issue but otherwise looks great, reads great. And I learned about .mdx
files!
Thanks for reviewing this @nutjob4life! Much appreciated! Yeah - MDX is allowing these guides to get all fancy, with embedded code and additional features. Some interesting possibilities down-the-line! Curious if the hyperlink issue you were seeing was related to this block or somewhere else? |
@riverma weird, my comment got dropped somehow. Anyway, the issue is the hyperlinking of You can rework it by writing something like:
|
Thanks for the clarification! Feedback incorporated 👍 |
|
||
# Container Security | ||
|
||
<pre align="center">Comprehensive guide to scanning container images for security vulnerabilities using pre-commit hooks and automated repository scanning tools.</pre> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @riverma explicit mention of Docker in the title is probably necessary. Reasoning; there are many (OCI-compliant) alternatives to Docker which could also be scanned for security vulnerabilities.
That is unless you want to broaden the scope of this best practice outside of Docker. Just food for thought :)
Nice work.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @lewismc - great observation! I was wanting to keep this guide title general so that we could support content for the Docker alternatives as well down-the-line.
That being said (and we could get feedback from @NASA-AMMOS/slim-community here too) - which other containers should we support within this guide? By that I mean: which other container technologies are actually being used by your projects right now or will be in aspiration? True to the SLIM philosophy - we tend to make guides that are targeted towards solutions / technology by our community members, and as the community grows, we iterate and expand the scope. (CC @NASA-AMMOS/slim-community-member-leads)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The Open Container Initiative (OCI) is a standard started and promoted by Docker, amongst others. Many on Lab are now using Podman, which reports to be OCI-compliant, in place of Docker. In fact, I believe it is mandated going forward on AWS for some teams. Here is more information on Podman origins.
Thinking off-the-grid, what about making it an OCI-compliant container security guide?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @lewismc @jpl-jengelke - thought about your suggestions, discussed a bit with @lylebarner and ended up swapping to the grype toolkit, which is OGC compliant and not Docker specific. Moreover, it can scan non-containers as well.
docs/guides/software-lifecycle/security/container-security/README.mdx
Outdated
Show resolved
Hide resolved
docs/guides/software-lifecycle/security/container-security/README.mdx
Outdated
Show resolved
Hide resolved
docs/guides/software-lifecycle/security/container-security/README.mdx
Outdated
Show resolved
Hide resolved
I didn't engage a formal review, but added a number of comments. Hopefully they are helpful. Also, I wanted to note there is no reason why we cannot have multiple container security guides, including a specific Docker container security guide. |
One suggestion from @ddalton-swe is to look at this tool (which is being utilized for some current projects): https://github.com/anchore/grype |
Thank you for the extensive review @jpl-jengelke . I’m going to try out an OCI complaint tool to support non-Docker containers, but if they are insufficient I’ll suggest with take @lewismc suggestion and make this a Docker specific guide for now and add in other scanning tools the community suggests for other container types later. |
@NASA-AMMOS/slim-community - I've made some updates to this PR to take into account feedback from @nutjob4life @jpl-jengelke @lewismc. Let me know if you have other thoughts! See live rendering here: https://riverma.github.io/slim/docs/guides/software-lifecycle/security/dependency-vulnerability-scanning/ |
docs/guides/software-lifecycle/security/dependency-vulnerability-scanning/README.mdx
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a fabulous guide and I am looking forward to bringing Grype into my toolchain. Big time approval.
I did have some comments but they can largely be ignored.
One other comment: the image static/img/continuous-testing-image.png
is included in the pull request but isn't referenced? Did I miss it?
Thanks for the guide!
docs/guides/software-lifecycle/security/dependency-vulnerability-scanning/README.mdx
Outdated
Show resolved
Hide resolved
docs/guides/software-lifecycle/security/dependency-vulnerability-scanning/README.mdx
Show resolved
Hide resolved
docs/guides/software-lifecycle/security/dependency-vulnerability-scanning/README.mdx
Outdated
Show resolved
Hide resolved
Thanks @nutjob4life - appreciate you taking the time and glad the guide is useful!
Looks like |
…ng precommit check
Guide has been vetted by projects like OPERA and PDS. Authorizing a merge. |
Purpose
Proposed Changes
Issues
Testing