

I try to slap anything I’d face the Internet with with the read_only to further restrict exploit possibilities, would be abs great if you could make it work! I just follow all reqs on the security cheat sheet, with read_only
being one of them: https://cheatsheetseries.owasp.org/cheatsheets/Docker_Security_Cheat_Sheet.html
With how simple it is I guessed that running as a user
and restricting cap_drop: all
wouldn’t be a problem.
For read_only
many containers just need tmpfs: /tmp
in addition to the volume for the db. I think many containers just try to contain temporary file writing to one directory to make applying read_only
easier.
So again, I’d abs use it with read_only
when you get the time to tune it!!
That’s pretty damn clever