
Part 3: Major Glassworm exploit infects vs code extensions
Keidrick Pettaway
Welcome back to It Achiever YT! In this video, we dive deep into OWASP Docker Top 10 - D01 Secure User Mapping, one of the most critical concepts for Docker and DevSecOps security. You’ll learn how to properly run Docker containers as non-root users, reduce privilege escalation risks, and implement least privilege in real environments. This is part of the OWASP Docker Top 10 series - helping you master container security, step by step. 🔍 What You’ll Learn ✅ What is Secure User Mapping? ✅ Why running as root is dangerous ✅ Attack vectors and real-world examples (RunC CVE-2019-5736) ✅ Secure vs insecure Dockerfile configurations ✅ How to implement non-root users in Docker ✅ Advanced: User namespace remapping (userns-remap) ✅ Verification and scanning tools ✅ Immediate action plan for production security 🧰 Commands Used # Insecure example (root) docker run nginx # Secure example docker run --user 1001:1001 nginx # Dockerfile example FROM ubuntu RUN useradd -m appuser && chown -R appuser:appuser /app WORKDIR /app USER appuser Enable user namespace remapping: { "userns-remap": "default" } Verify user configuration: docker inspect container --format '{{.Config.User}}' docker exec -it container whoami docker exec -it container id docker top container -eo pid,user,comm 🔒 Key Takeaways • Never run containers as root in production. • Always use non-root UIDs (USER directive or --user flag). • Enable user namespace remapping for extra protection. • Continuously verify with docker inspect and automated scanners. 📚 References • OWASP Docker Security Project: D01 Secure User Mapping • CVE-2019-5736 (RunC Vulnerability) • Docker Bench for Security | Trivy | Anchore 💡 Action Plan • Audit all running containers - identify UID 0. • Fix Dockerfiles - add USER directive. • Enable userns-remap - reduce attack surface. • Monitor continuously - automate with CI/CD checks. ❤️ Support & Subscribe If you found this helpful, like, share, and subscribe to It Achiever YT for the full OWASP Docker Top 10 Series. 🔔 Turn on notifications so you don’t miss D02 - Docker Daemon Configuration Security next week! #Docker #DevSecOps #OWASP #DockerSecurity #ContainerSecurity #Kubernetes #CloudSecurity #CyberSecurity #DevOps #UserNamespace #OWASPDocker #DockerBestPractices #ContainerHardening #RunAsNonRoot #LeastPrivilege #SecurityTutorial #ItAchieverYT #DockerTips #DevSecOpsIndia