In this chapter, we covered some aspects of Docker security. First, we took a look at containers versus typical virtual machines with regards to security. We looked at the good, the not so bad, and what to look out for.
We then took a look at what Docker commands we can use for security purposes. We first took a look at read-only containers, so we can minimize what we are exposing to other containers. We then viewed what is done to the images that you have running. It is important to know what is done on these containers, so you have a trail of activity.
Next, we took a look at the Center for Internet Security guidelines for Docker. This guide will assist you in setting up multiple aspects of your Docker environment. Lastly, we took a look at the Docker bench for security. We looked at how to get it up and running and ran through an example of what the output would look like once it has been run. We then took a look at the said output to see what all it meant. Remember the six items...