Securing Docker

Learn how to secure your Docker environment and keep your environments secure irrespective of the threats out there

Securing Docker

Scott Gallagher

1 customer reviews
Learn how to secure your Docker environment and keep your environments secure irrespective of the threats out there
Mapt Subscription
FREE
$29.99/m after trial
eBook
$22.40
RRP $31.99
Print + eBook
$39.99
RRP $39.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$22.40
$39.99
$29.99p/m after trial
RRP $31.99
RRP $39.99
Subscription
eBook
Print + eBook
Start 30 Day Trial
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 
Code Files
Preview in Mapt

Book Details

ISBN 139781785888854
Paperback126 pages

Book Description

With the rising integration and adoption of Docker containers, there is a growing need to ensure their security.

The purpose of this book is to provide techniques and enhance your skills to secure Docker containers easily and efficiently. The book starts by sharing the techniques to configure Docker components securely and explore the different security measures/methods one can use to secure the kernel.

Furthermore, we will cover the best practices to report Docker security findings and will show you how you can safely report any security findings you come across. Toward the end, we list the internal and third-party tools that can help you immunize your Docker environment.

By the end of this book, you will have a complete understanding of Docker security so you are able to protect your container-based applications.

Table of Contents

Chapter 1: Securing Docker Hosts
Docker host overview
Discussing Docker host
Virtualization and isolation
Attack surface of Docker daemon
Securing Docker hosts
Docker Machine
SELinux and AppArmor
Auto-patching hosts
Summary
Chapter 2: Securing Docker Components
Docker Content Trust
Docker Subscription
Docker Trusted Registry
Docker Registry
Summary
Chapter 3: Securing and Hardening Linux Kernels
Linux kernel hardening guides
Linux kernel hardening tools
Summary
Chapter 4: Docker Bench for Security
Docker security – best practices
Docker – best practices
CIS guide
The Docker Bench Security application
Summary
Chapter 5: Monitoring and Reporting Docker Security Incidents
Docker security monitoring
Docker CVE
Mailing lists
Docker security reporting
Additional Docker security resources
Summary
Chapter 6: Using Docker's Built-in Security Features
Docker tools
Docker security fundamentals
Containers versus virtual machines
Summary
Chapter 7: Securing Docker with Third-party Tools
Third-party tools
Other third-party tools
Summary
Chapter 8: Keeping up Security
Keeping up with security
Other areas of interest
Summary

What You Will Learn

  • Find out how to secure your Docker hosts and nodes
  • Secure your Docker components
  • Explore different security measures/methods for Linux kernels
  • Install and run the Docker Bench security application
  • Monitor and report security issues
  • Familiarize yourself with third-party tools such as Traffic Authorization, Summon, sVirt, and SELinux to secure your Docker environment

Authors

Table of Contents

Chapter 1: Securing Docker Hosts
Docker host overview
Discussing Docker host
Virtualization and isolation
Attack surface of Docker daemon
Securing Docker hosts
Docker Machine
SELinux and AppArmor
Auto-patching hosts
Summary
Chapter 2: Securing Docker Components
Docker Content Trust
Docker Subscription
Docker Trusted Registry
Docker Registry
Summary
Chapter 3: Securing and Hardening Linux Kernels
Linux kernel hardening guides
Linux kernel hardening tools
Summary
Chapter 4: Docker Bench for Security
Docker security – best practices
Docker – best practices
CIS guide
The Docker Bench Security application
Summary
Chapter 5: Monitoring and Reporting Docker Security Incidents
Docker security monitoring
Docker CVE
Mailing lists
Docker security reporting
Additional Docker security resources
Summary
Chapter 6: Using Docker's Built-in Security Features
Docker tools
Docker security fundamentals
Containers versus virtual machines
Summary
Chapter 7: Securing Docker with Third-party Tools
Third-party tools
Other third-party tools
Summary
Chapter 8: Keeping up Security
Keeping up with security
Other areas of interest
Summary

Book Details

ISBN 139781785888854
Paperback126 pages
Read More
From 1 reviews

Read More Reviews