User Tools

Site Tools


docker:security:prefer_minimal_base_images

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
docker:security:prefer_minimal_base_images [2020/04/18 19:23] peterdocker:security:prefer_minimal_base_images [2020/07/15 09:30] (current) – external edit 127.0.0.1
Line 5: Line 5:
   * Choose images with fewer OS libraries and tools lower the risk and attack surface of the container.   * Choose images with fewer OS libraries and tools lower the risk and attack surface of the container.
   * Prefer alpine-based images over full-blown system OS images.   * Prefer alpine-based images over full-blown system OS images.
 +
 +----
 +
 +Often times, you might start projects with a generic Docker container image such as writing a **Dockerfile** with a **FROM** node, as your “default”.
 +
 +However, when specifying the node image, you should take into consideration that the fully installed Debian Stretch distribution is the underlying image that is used to build it.
 +
 +If your project doesn’t require any general system libraries or system utilities then it is better to avoid using a full blown operating system (OS) as a base image.
  
  
docker/security/prefer_minimal_base_images.1587237828.txt.gz · Last modified: 2020/07/15 09:30 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki