Severity Framework
Snyk CCSS
Rule category
Containers / Volumes
Is your enviroment affected by this misconfiguration?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsFrameworks
CIS-Controls
CSA-CCM
NIST-800-53
PCI-DSS
- Snyk ID SNYK-CC-00149
- credit Snyk Research Team
Description
Mounting the container's root filesystem as read-only reduces security attack vectors since the container instance's filesystem cannot be tampered with or written to unless it has explicit read-write permissions on its filesystem folder and directories.
How to fix?
In the container_definitions
attribute, set readonlyRootFilesystem
to true
.
Example Configuration
resource "aws_ecs_task_definition" "valid_read_only_root_fs" {
family = "valid_read_only_root_fs"
container_definitions = <<EOF
[
{
"name": "valid_read_only_root_fs",
"image": "hello-world",
"memory": 128,
"readonlyRootFilesystem": true
}
]
EOF
requires_compatibilities = ["EC2"]
}