Skip to content

Latest commit

 

History

History
executable file
·
25 lines (11 loc) · 807 Bytes

19-Restrict-syscalls-using-seccomp.md

File metadata and controls

executable file
·
25 lines (11 loc) · 807 Bytes

Restrict Syscalls using Seccomp

In this section, we will take a look at Restrict Syscalls using Seccomp.

  • By default, the Linux kernel would allow any syscall to be invoked by programs running in the user space which can increase the attack surface.

  • Seccomp stands for secure computing and it is a Linux Kernel feature that can be used to sandbox applications to only use the syscalls they need.

Seccomp Modes

seccompModes

  • Docker has a built-in seccomp filter that it uses by default whenever we create a container.

    seccompFilters

References