Tools for "scanning" container (hardening) vulnerabilities vs tools for "performing" the hardening [closed]

CIS has published a list of container vulnerabilities that should be addressed to complete the hardening process.

Are there separate sets of tools that only point out the vulnerabilities
and then tools that "fix" the vulnerabili… Continue reading Tools for "scanning" container (hardening) vulnerabilities vs tools for "performing" the hardening [closed]

How to only allow whitelisted processes to access a certain file using SElinux?

Let’s say you have a important file/folder, and want to only allow certain processes (based on process name, or its corresponding ELF file on the disk, or the digital signature of the corresponding ELF, etc) to read/write to that file. How… Continue reading How to only allow whitelisted processes to access a certain file using SElinux?

Is it possible to protect browser credentials from malicious processes?

What items should be considered to create a browser that prevents all access to stored credentials by a malicious process? Hardware attacks being out of scope.
Are there public projects addressing this?
In an attempt to answer this myself,… Continue reading Is it possible to protect browser credentials from malicious processes?

SECCOMP inside a docker container adds an extra layer of security?

Does hardening with SECCOMP a binary running inside a Docker container brings extra security? I can find many articles/papers about hardening the container itself but very few things about hardening binaries inside the container.
SECCOMP w… Continue reading SECCOMP inside a docker container adds an extra layer of security?