A custom AppArmor profile generator for Docker containers that simplifies security configuration.
Bane is a custom AppArmor profile generator for Docker containers. It automates the creation of security profiles that restrict container capabilities, file access, and network operations. The tool solves the problem of manually writing complex AppArmor profiles, making container security more manageable and less error-prone.
System administrators, DevOps engineers, and security professionals who deploy Docker containers and need to enforce strict security policies using AppArmor.
Developers choose Bane because it simplifies AppArmor profile generation with a declarative configuration, reducing manual effort and potential security gaps. Its seamless Docker integration and automatic installation make it a practical tool for hardening containerized applications.
Custom & better AppArmor profile generator for Docker containers.
Uses a simple TOML file to define permissions, as shown in sample.toml, eliminating the need to write complex AppArmor syntax manually.
Installs generated profiles directly into `/etc/apparmor.d/containers/` and runs `apparmor_parser`, streamlining deployment without manual steps.
Profiles are designed to work with Docker's `--security-opt` flag, making it easy to apply security to containers, as demonstrated in the usage examples.
Includes `LogOnWritePaths` to log write operations, with sample dmesg output provided, aiding in monitoring and debugging security events.
Bane only generates AppArmor profiles and is tailored for Docker, making it unsuitable for SELinux systems or other container runtimes like Podman without adaptation.
Profiles are generated from static TOML files and require regeneration for changes, lacking support for dynamic policy updates during container runtime.
Installation and profile application require sudo/root access, which can complicate deployment in automated or restricted environments, as noted in the installation commands.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A vulnerability scanner for container images and filesystems
Vulnerability Static Analysis for Containers
Vulnerability Static Analysis for Containers
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.