You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/security-best-practices.md
+16-4Lines changed: 16 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,15 @@
1
-
# Guide
1
+
²# Security Best Practices
2
2
3
-
This guide helps you make the most of the OCI image, with a focus on compatibility and security.
3
+
This guide provides practical instructions for optimizing the OCI image, with an emphasis on ensuring both compatibility and security.
4
4
5
5
## OWASP - Docker Security Cheat Sheet
6
6
7
-
The [OWASP Docker Security Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Docker_Security_Cheat_Sheet.html) provides a comprehensive overview of
8
-
best practices that we recommend you to follow when running the PaperMC server container.
7
+
The [OWASP Docker Security Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Docker_Security_Cheat_Sheet.html) offers a thorough guide to securing
8
+
Docker containers. We strongly recommend following these best practices when running the PaperMC server container.
9
+
10
+
In the following sections, we’ll explain how to implement some of these recommendations specifically for this image.
11
+
12
+
_**Note:** Making the filesystem read-only is not yet fully supported in this image._
For more details about OpenShift’s Security Context Constraints (SCCs), refer to
23
27
the [official documentation](https://docs.openshift.com/container-platform/latest/concepts/policy/security-context-constraints.html).
24
28
29
+
## Linux Kernel Capabilities & Privileges
30
+
31
+
It is recommended to drop all Linux kernel capabilities, as this enhances security without affecting the container’s functionality. The PaperMC server does not
32
+
require any special privileges, so this should not cause issues for most workloads. However, if you encounter specific problems, you can re-enable individual
33
+
capabilities as needed.
34
+
35
+
Additionally, disabling privilege escalation tools like `su` and `sudo` is recommended to further restrict potential security risks.
36
+
25
37
## Resource Limits
26
38
27
39
Setting appropriate resource limits is essential to ensure the container behaves reliably, securely, and within predictable boundaries. This aligns with [OWASP
0 commit comments