Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Securing Docker

Posted By: AlenMiler
Securing Docker

Securing Docker by Scott Gallagher
English | Mar. 30, 2016 | ISBN: 1785888854 | 126 Pages | AZW3/MOBI/EPUB/PDF (conv) | 8 MB

With the rising integration and adoption of Docker containers, there is a growing need to ensure their security.

Key Features

Gain confidence in using Docker for containerization without compromising on security
This book covers different techniques to help you develop your container security skills
It is loaded with practical examples and real-world scenarios to secure your container-based applications

Book Description

The purpose of this book is to provide techniques and enhance your skills to secure Docker containers easily and efficiently. The book starts by sharing the techniques to configure Docker components securely and explore the different security measures/methods one can use to secure the kernel.

Furthermore, we will cover the best practices to report Docker security findings and will show you how you can safely report any security findings you come across. Toward the end, we list the internal and third-party tools that can help you immunize your Docker environment.

By the end of this book, you will have a complete understanding of Docker security so you are able to protect your container-based applications.

What you will learn

Find out how to secure your Docker hosts and nodes
Secure your Docker components
Explore different security measures/methods for Linux kernels
Install and run the Docker Bench security application
Monitor and report security issues
Familiarize yourself with third-party tools such as Traffic Authorization, Summon, sVirt, and SELinux to secure your Docker environment

About the Author

Scott Gallagher has been fascinated with technology since he was in elementary school, when he used to play Oregon Trail. His love continued through middle school, working on more Apple IIe computers. In high school, he learned how build computers and program in BASIC! His college years were all about server technologies such as Novell, Microsoft, and Red Hat. After college, he continued to work on Novell, all while keeping an interest in all the technologies. He then moved into managing Microsoft environments and eventually into what he is the most passionate about, Linux environments, and now his focus is on Docker and cloud environments.

Table of Contents

Securing Docker Hosts
Securing Docker Components
Securing and Hardening Linux Kernels
Docker Bench for Security
Monitoring and Reporting Docker Security Incidents
Using Docker's Built-in Security Features
Securing Docker with Third-party Tools
Keeping up Security