- https://medium.com/better-programming/running-a-container-with-a-non-root-user-e35830d1f42a
- http://www.projectatomic.io/blog/2015/08/why-we-dont-let-non-root-users-run-docker-in-centos-fedora-or-rhel/
- https://docs.docker.com/engine/security/#docker-daemon-attack-surface
- https://docs.docker.com/engine/install/linux-postinstall/
- https://docs.docker.com/engine/security/apparmor/
- https://docs.docker.com/engine/security/userns-remap/
- https://docs.docker.com/engine/security/rootless/
- https://unit42.paloaltonetworks.com/breaking-docker-via-runc-explaining-cve-2019-5736/
- https://morphuslabs.com/attacking-docker-environments-a703fcad2a39
- https://www.cvedetails.com/vulnerability-list/vendor_id-13534/product_id-28125/Docker-Docker.html
- https://www.blackhat.com/docs/us-17/thursday/us-17-Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence_wp.pdf
- https://i.blackhat.com/us-18/Thu-August-9/us-18-McGrew-An-Attacker-Looks-At-Docker-Approaching-Multi-Container-Applications-wp.pdf