Get the latest tech news
Root your Docker host in 10 seconds for fun and profit (2017)
Ferry Boender's blog
For example, an automated build process may need a user on the target system to stop and recreate containers for testing or deployments. Either that same courtesy does not extend to the community edition, security by default is no longer a requirement, or it’s a completely false claim. They do make some casual remarks about not giving access to the docker daemon to untrusted users in the Security section of the documentation:
Or read this on Hacker News