Book Image

Learning Docker - Second Edition

By : Vinod Singh, Pethuru Raj, Jeeva S. Chelladhurai
Book Image

Learning Docker - Second Edition

By: Vinod Singh, Pethuru Raj, Jeeva S. Chelladhurai

Overview of this book

Docker is an open source containerization engine that offers a simple and faster way for developing and running software. Docker containers wrap software in a complete filesystem that contains everything it needs to run, enabling any application to be run anywhere – this flexibily and portabily means that you can run apps in the cloud, on virtual machines, or on dedicated servers. This book will give you a tour of the new features of Docker and help you get started with Docker by building and deploying a simple application. It will walk you through the commands required to manage Docker images and containers. You’ll be shown how to download new images, run containers, list the containers running on the Docker host, and kill them. You’ll learn how to leverage Docker’s volumes feature to share data between the Docker host and its containers – this data management feature is also useful for persistent data. This book also covers how to orchestrate containers using Docker compose, debug containers, and secure containers using the AppArmor and SELinux security modules.
Table of Contents (13 chapters)

Securing Docker Containers

So far, we have talked a lot about the fast-evolving Docker technology in this book. It is not a nice and neat finish if the Docker-specific security issues and solution approaches are not articulated in detail to you. Hence, this chapter is specially crafted and incorporated into this book in order to explain all about the security challenges of Docker-inspired containerization. We also wanted to throw more light on how the lingering security concerns are being addressed through a host of pioneering technologies, high-quality algorithms, enabling tools, and best practices. In this chapter, we will deal with the following crucial topics in detail:

  • Are the Docker containers secure?
  • The security features of containers
  • The emerging security-enabling approaches
  • The best practices for ensuring container security
...