Securing Docker.pdf

豆瓣评分:0.0
豆瓣简介:
Key Features
Gain confidence in using Docker for containerization without compromising on securityThis book covers different techniques to help you develop your container security skillsIt is loaded with practical examples and real-world scenarios to secure your container-based applications
Book Description
With the rising integration and adoption of Docker containers, there is a growing need to ensure their security.
The purpose of this book is to provide techniques and enhance your skills to secure Docker containers easily and efficiently. The book starts by sharing the techniques to configure Docker components securely and explore the different security measures/methods one can use to secure the kernel.
Furthermore, we will cover the best practices to report Docker security findings and will show you how you can safely report any security findings you come across. Toward the end, we list the internal and third-party tools that can help you immunize your Docker environment.
By the end of this book, you will have a complete understanding of Docker security so you are able to protect your container-based applications.
What you will learn
Find out how to secure your Docker hosts and nodesSecure your Docker componentsExplore different security measures/methods for Linux kernelsInstall and run the Docker Bench security applicationMonitor and report security issuesFamiliarize yourself with third-party tools such as Traffic Authorization, Summon, sVirt, and SELinux to secure your Docker environment
About the Author
Scott Gallagher has been fascinated with technology since he was in elementary school, when he used to play Oregon Trail. His love continued through middle school, working on more Apple IIe computers. In high school, he learned how build computers and program in BASIC! His college years were all about server technologies such as Novell, Microsoft, and Red Hat. After college, he continued to work on Novell, all while keeping an interest in all the technologies. He then moved into managing Microsoft environments and eventually into what he is the most passionate about, Linux environments, and now his focus is on Docker and cloud environments.
Table of Contents
Securing Docker HostsSecuring Docker ComponentsSecuring and Hardening Linux KernelsDocker Bench for SecurityMonitoring and Reporting Docker Security IncidentsUsing Docker’s Built-in Security FeaturesSecuring Docker with Third-party ToolsKeeping up Security
下载链接

发表回复

您的电子邮箱地址不会被公开。 必填项已用*标注