So far, we have talked a lot about the fast emerging Docker technology in this book. It is not a nice and neat finish if Docker-specific security issues and solution approaches are not articulated in detail to you. Hence, this chapter is specially crafted and incorporated in this book in order to explain about the growing security challenges of Docker-inspired containers. We also wanted to throw more light on how lingering security concerns are being addressed through a host of pioneering technologies, high-quality algorithms, enabling tools, and best practices.
In this chapter, we are going to deal with the following topics in detail:
Are Docker containers secure?
The security features of containers
The emerging security approaches
The best practices for container security
Ensuring unbreakable and impenetrable security for any IT system and business services has been one of the prime needs and predominant challenges in the IT field for decades. Brilliant...