Why allow “everyone” to have read write permission to shared folders in order to run container manager? Wouldn’t this be insecure?
Why allow “everyone” to have read write permission to shared folders in order to run container manager? Wouldn’t this be insecure?
The main thing I see you can avoid with locking down the docker images into a separate low permission user that can only access what they really need is if someone successfully attacks a project and you get infected with some shit when your Synology pulls image:latest.
It could limit the traversal of a ransomware that successfully breaks free of the container but ends up having no permissions outside as an example.
I would probably purge the whole NAS and setup from my backup for my own peace of mind even with the user separation though.
edit: updating “low user” to “low permission user”, amazing how the brain can fill in words for you when reading your own texts.