docker:security:prefer_minimal_base_images
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
docker:security:prefer_minimal_base_images [2020/04/18 19:23] – created peter | docker:security:prefer_minimal_base_images [2020/07/15 09:30] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 3: | Line 3: | ||
Many top docker images include lots of vulnerabilities in their system libraries. | Many top docker images include lots of vulnerabilities in their system libraries. | ||
- | | + | |
- | | + | |
+ | |||
+ | ---- | ||
+ | |||
+ | Often times, you might start projects with a generic Docker container image such as writing a **Dockerfile** with a **FROM** node, as your “default”. | ||
+ | |||
+ | However, when specifying the node image, you should take into consideration that the fully installed Debian Stretch distribution is the underlying image that is used to build it. | ||
+ | |||
+ | If your project doesn’t require any general system libraries or system utilities then it is better to avoid using a full blown operating system (OS) as a base image. | ||
docker/security/prefer_minimal_base_images.1587237816.txt.gz · Last modified: 2020/07/15 09:30 (external edit)