[!NOTE]
Enhanced Container Isolation is available to Docker Business customers only.
Enhanced Container Isolation provides an additional layer of security to prevent malicious workloads running in containers from compromising Docker Desktop or the host.
It uses a variety of advanced techniques to harden container isolation, but without impacting developer productivity. It is available with Docker Desktop 4.13.0 and later.
These techniques include:
- Running all containers unprivileged through the Linux user-namespace, even those launched with the --privileged
flag. This makes it harder for malicious container workloads to escape the container and infect the Docker Desktop VM and host.
- Ensuring Docker Desktop VM immutability (e.g., its internal settings can't be modified by containers or users).
- Vetting some critical system calls to prevent container escapes, and partially virtualizing portions of /proc
and /sys
inside the container for further isolation.
- Preventing user console access to the Docker Desktop VM.
When Enhanced Container Isolation is enabled, these mechanisms are applied automatically and with minimal functional or performance impact to developers. Developers continue to use Docker Desktop as usual, but the containers they launch are more strongly isolated.
Enhanced Container Isolation ensures stronger container isolation and also locks in any security configurations that have been created by IT admins, for instance through Registry Access Management policies or with Settings Management.
[!NOTE]
Enhanced Container Isolation is in addition to other container security techniques used by Docker. For example, reduced Linux Capabilities, Seccomp, AppArmor.
Who is it for?#
- For organizations and developers that want to prevent container attacks and reduce vulnerabilities in developer environments.
- For organizations that want to ensure stronger container isolation that is easy and intuitive to implement on developers' machines.
What happens when Enhanced Container Isolation is turned on?#
When Enhanced Container Isolation is turned on, the following features are enabled:
- All user containers are automatically run in Linux User Namespaces which ensures stronger isolation. Each container runs in a dedicated Linux user-namespace.
- The root user in the container maps to an unprivileged user inside the Docker Desktop Linux VM.
- Containers become harder to breach. For example, sensitive system calls are vetted and portions of
/proc
and/sys
are emulated. - Users can continue using containers as usual, including bind mounting host directories, volumes, etc.
- No change in the way developers run containers, and no special container images are required.
- Privileged containers (e.g.,
--privileged
flag) work, but they are only privileged within the container's Linux User Namespace, not in the Docker Desktop VM. Therefore they can't be used to breach the Docker Desktop VM. - Docker-in-Docker and even Kubernetes-in-Docker works, but run unprivileged inside the Docker Desktop Linux VM.
In addition, the following restrictions are imposed:
- Containers can no longer share namespaces with the Docker Desktop VM (e.g.,
--network=host
,--pid=host
are disallowed). - Containers can no longer modify configuration files inside the Docker Desktop VM (e.g., mounting any VM directory into the container is disallowed).
- Containers can no longer access the Docker engine (e.g., mounting the Docker engine's socket into the container is restricted); this prevents malicious containers from gaining control of the Docker engine. Admins can relax this for trusted container images.
- Console access to the Docker Desktop VM is forbidden for all users.
These features and restrictions ensure that containers are better secured at runtime, with minimal impact to developer experience and productivity.
For more information on how Enhanced Container Isolation work, see How does it work.
[!IMPORTANT]
Enhanced Container Isolation does not yet fully protect Docker builds, Kubernetes pods and Extension containers. For more information on known limitations and workarounds, see FAQs.
What host OSes / platforms is Enhanced Container Isolation supported on?#
Enhanced Container Isolation (ECI) was introduced in Docker Desktop 4.13, for all platforms (Windows, Mac, and Linux).
For Windows hosts, ECI works with both the Docker Desktop Hyper-V and WSL 2 backends, as follows:
- Docker Desktop 4.19 or prior: ECI only works with Hyper-V.
- Docker Desktop 4.20 or later: ECI Works with both Hyper-V and WSL 2 (with WSL version 1.1.3.0 and above).
See ECI Support for WSL for further info as well as security caveats when using Enhanced Container Isolation on WSL 2.
How do I enable Enhanced Container Isolation?#
As a developer#
To enable Enhanced Container Isolation as a developer: 1. Ensure your organization has a Docker Business subscription. 2. Sign in to your organization in Docker Desktop. This will ensure the ECI feature is available to you in Docker Desktop's Settings menu. 3. Stop and remove all existing containers. 4. Navigate to Settings > General in Docker Desktop. 5. Next to Use Enhanced Container Isolation, select the checkbox. 6. Select Apply and restart to save your settings.
[!IMPORTANT]
Enhanced Container Isolation does not protect containers created prior to enabling ECI. For more information on known limitations and workarounds, see FAQs.
As an admin#
Prerequisite#
To enable Enhanced Container Isolation as an admin, you first need to enforce sign-in. This is because the Enhanced Container Isolation feature requires a Docker Business subscription and therefore your Docker Desktop users must authenticate to your organization for this configuration to take effect.
Enforcing sign-in ensures that your Docker Desktop developers always authenticate to your organization.
Setup#
Create and configure the admin-settings.json
file and specify:
{
"configurationFileVersion": 2,
"enhancedContainerIsolation": {
"value": true,
"locked": true
}
}
By setting "value": true
, the admin ensures ECI is enabled by default. By
setting "locked": true
, the admin ensures ECI can't be disabled by
developers. If you wish to give developers the ability to disable the feature,
set "locked": false
.
In addition, starting with Docker Desktop 4.27, admins can also configure Docker socket mount permissions for containers, as described here.
For this to take effect:
- On a new install, developers need to launch Docker Desktop and authenticate to their organization.
- On an existing install, developers need to quit Docker Desktop through the Docker menu, and then relaunch Docker Desktop. If they are already signed in, they don’t need to sign in again for the changes to take effect.
[!IMPORTANT]
Selecting Restart from the Docker menu isn't enough as it only restarts some components of Docker Desktop.
What do users see when this setting is enforced by an admin?#
When Enhanced Container Isolation is enabled, users see: - Use Enhanced Container Isolation toggled on in Settings > General. - Containers run within a Linux user namespace.
To check, run:
$ docker run --rm alpine cat /proc/self/uid_map
The following output displays:
0 100000 65536
This indicates that the container's root user (0) maps to unprivileged user (100000) in the Docker Desktop VM, and that the mapping extends for a range of 64K user-IDs. If a container process were to escape the container, it would find itself without privileges at the VM level. The user-ID mapping varies with each new container, as each container gets an exclusive range of host User-IDs for isolation. User-ID mapping is automatically managed by Docker Desktop. For further details, see How Enhanced Container Isolation works.
In contrast, without ECI the Linux user namespace is not used for containers, the following displays:
0 0 4294967295
This means that the root user in the container (0) is in fact the root user in the Docker Desktop VM (0) which reduces container isolation.
Since Enhanced Container Isolation uses the Sysbox container runtime embedded in the Docker Desktop Linux VM, another way to determine if a container is running with Enhanced Container Isolation is by using docker inspect
:
$ docker inspect --format='\{\{\.HostConfig.Runtime}}' my_container
It outputs:
sysbox-runc
Without Enhanced Container Isolation, docker inspect
outputs runc
, which is the standard OCI runtime.