Securing Docker


Securing Docker
Download

With the rising integration and adoption of Docker containers, there is a growing need to ensure their security. Key Features Gain confidence in using Docker for containerization without compromising on security This book covers different techniques to help you develop your container security skills It is loaded with practical examples and real-world scenarios to secure your container-based applications Book Description The purpose of this book is to provide techniques and enhance your skills to secure Docker containers easily and efficiently. The book starts by sharing the techniques to configure Docker components securely and explore the different security measures/methods one can use to secure the kernel. Furthermore, we will cover the best practices to report Docker security findings and will show you how you can safely report any security findings you come across. Toward the end, we list the internal and third-party tools that can help you immunize your Docker environment. By the end of this book, you will have a complete understanding of Docker security so you are able to protect your container-based applications. What you will learn Find out how to secure your Docker hosts and nodes Secure your Docker components Explore different security measures/methods for Linux kernels Install and run the Docker Bench security application Monitor and report security issues Familiarize yourself with third-party tools such as Traffic Authorization, Summon, sVirt, and SELinux to secure your Docker environment About the Author Scott Gallagher has been fascinated with technology since he was in elementary school, when he used to play Oregon Trail. His love continued through middle school, working on more Apple IIe computers. In high school, he learned how build computers and program in BASIC! His college years were all about server technologies such as Novell, Microsoft, and Red Hat. After college, he continued to work on Novell, all while keeping an interest in all the technologies. He then moved into managing Microsoft environments and eventually into what he is the most passionate about, Linux environments, and now his focus is on Docker and cloud environments. Table of Contents Securing Docker Hosts Securing Docker Components Securing and Hardening Linux Kernels Docker Bench for Security Monitoring and Reporting Docker Security Incidents Using Docker’s Built-in Security Features Securing Docker with Third-party Tools Keeping up Security

Leave a Reply