Post

Securing docker daemon

Best practices for securing the Docker daemon, including using TLS and avoiding insecure remote access.

Securing docker daemon

Best practices

By default, the Docker daemon listens on a Unix socket which is only accessible locally. Exposing the daemon over TCP without TLS is insecure and should be avoided. When remote access is needed, always enable TLS encryption.

1
2
3
export DOCKER_HOST=192.1681.2 <---- insecure
/var/run/docker.sock   < --- secure
export DOCKER_TLS=true
This post is licensed under CC BY 4.0 by the author.