Book Image

Securing Docker

By : Scott Gallagher
Book Image

Securing Docker

By: Scott Gallagher

Overview of this book

<p>With the rising integration and adoption of Docker containers, there is a growing need to ensure their security.</p> <p>The purpose of this book is to provide techniques and enhance your skills to secure Docker containers easily and efficiently. The book starts by sharing the techniques to configure Docker components securely and explore the different security measures/methods one can use to secure the kernel.</p> <p>Furthermore, we will cover the best practices to report Docker security findings and will show you how you can safely report any security findings you come across. Toward the end, we list the internal and third-party tools that can help you immunize your Docker environment.</p> <p>By the end of this book, you will have a complete understanding of Docker security so you are able to protect your container-based applications.</p>
Table of Contents (15 chapters)
Securing Docker
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Docker – best practices


Before we dive into the CIS guide, let's go over some of the following best practices when using Docker:

  • One application per container: Spread your applications to one per container. Docker was built for this and it makes everything easy at the end of the day. The isolation that we talked about earlier is where this is the key.

  • Review who has access to your Docker hosts: Remember that whoever has the access to your Docker hosts has the access to manipulate all your images and containers on the host.

  • Use the latest version: Always use the latest version of Docker. This will ensure that all the security holes have been patched and you have the latest features as well.

  • Use the resources: Use the resources available if you need help. The community within Docker is huge and immensely helpful. Use their website, documentation, and the Internet Relay Chat (IRC) chat rooms to your advantage.