Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

REQUEST: Use distroless image in final stage #103

Open
xunholy opened this issue Jun 8, 2021 · 4 comments
Open

REQUEST: Use distroless image in final stage #103

xunholy opened this issue Jun 8, 2021 · 4 comments

Comments

@xunholy
Copy link

xunholy commented Jun 8, 2021

FROM docker.mirror.hashicorp.services/alpine:3.13

I'd like the request we move the final stage of the image to a distroless image - or even an image that has no shell.

It would also be great to do some image scanning for known CVE vulnerabilities as it appears there are some in this image that are marked HIGH and CRITICAL respectively.

@tomhjp
Copy link
Contributor

tomhjp commented Jun 10, 2021

Hi @xunholy, thanks for raising this. The 0.3.0 release was initially pushed to docker based on alpine 3.13.2 in error, and it has now been updated with the same binary layered on 3.13.5 as it should have been based on our Dockerfile. I believe this should address the CVEs of concern?

Separately, on the question of a distro-less image, could you explain a little more about the motivation for this request please?

@xunholy
Copy link
Author

xunholy commented Jun 10, 2021

Hi @tomhjp thanks for informing me about the image error.

Our ask for distroless is to avoid several exploits and to help harden our implementation in GKE. With this plugin we were able to surface a few attack vectors that we can completely mitigate if there was no shell that could be used to exploit. Obviously we have the default position that things like pods/exec and other RBAC controls are in place, but this is also helping protect from lateral privilege escalation from other compromised workloads that might be used to bleed into this particular workload.

We're using the GSM plugin among others and these are all based on distroless images in final stages, my ask would be to keep it aligned with that to help reduce the attack surface seeing as secret management is such a critical asset.

https://github.com/GoogleCloudPlatform/secrets-store-csi-driver-provider-gcp/blob/feac841f5835f47a35e5f978f4924edecd2d13e9/Dockerfile#L19

**Sorry for being slightly cryptic 😅

@xunholy
Copy link
Author

xunholy commented Jun 15, 2021

@tomhjp any further consideration or context required?

@Sineaggi
Copy link

Sineaggi commented Feb 9, 2022

Would this still be considered for a future release?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants