content/manuals/security/faqs/containers.md
Docker Desktop runs all containers inside a customized Linux virtual machine (except for native Windows containers). This adds strong isolation between containers and the host machine, even when containers run as root.
Important considerations include:
--privileged, --pid=host, --cap-add) run with elevated privileges inside the VM, giving them access to VM internals and Docker EngineWith Enhanced Container Isolation turned on, each container runs in a dedicated Linux user namespace inside the Docker Desktop VM. Even privileged containers only have privileges within their container boundary, not the VM. ECI uses advanced techniques to prevent containers from breaching the Docker Desktop VM and Docker Engine.
Containers can only access host files that are:
docker run -v /path/to/host/file:/mnt)No. Host file sharing uses a user-space file server (running in com.docker.backend as the Docker Desktop user), so containers can only access files that the Docker Desktop user already has permission to access.