In this section, we will look at the best practices when it comes to Docker, as well as the Center for Internet Security guide, to properly secure all aspects of your Docker environment.
Before we dive into the Center for Internet Security guide, let's go over some of the best practices for using Docker, as follows:
- One application per container: Spread out your applications to one per container. Docker was built for this, and it makes everything easier, at the end of the day. The isolation that we discussed earlier is where this is key.
- Only install what you need: As we already covered in previous chapters, only install what you need in your container images. If you have to install...