Securing Docker : learn how to secure your Docker environment and keep your environments secure irrespective of the threats out there /
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
2016.
|
Colección: | Community experience distilled.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover ; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Securing Docker Hosts; Docker host overview; Discussing Docker host; Virtualization and isolation; Attack surface of Docker daemon; Protecting the Docker daemon; Securing Docker hosts; Docker Machine; SELinux and AppArmor; Auto-patching hosts; Summary; Chapter 2 : Securing Docker Components; Docker Content Trust; Docker Content Trust components; Signing images; Hardware signing; Docker Subscription; Docker Trusted Registry; Installation; Securing Docker Trusted Registry
- AdministeringWorkflow; Docker Registry; Installation; Configuration and security; Summary; Chapter 3 : Securing and Hardening Linux Kernels; Linux kernel hardening guides; SANS hardening guide deep dive; Access controls; Distribution focused; Linux kernel hardening tools; Grsecurity; Lynis; Summary; Chapter 4 : Docker Bench for Security; Docker security
- best practices; Docker
- best practices; CIS guide; Host configuration; Docker daemon configuration; Docker daemon configuration files; Container images/runtime; Docker security operations; The Docker Bench Security application
- Running the toolRunning the tool
- host configuration; Running the tool
- Docker daemon configuration; Running the tool
- Docker daemon configuration files; Running the tool
- container images and build files; Running the tool
- container runtime; Running the tool
- Docker security operations; Understanding the output; Understanding the output
- host configuration; Understanding the output
- the Docker daemon configuration; Understanding the output
- the Docker daemon configuration files; Understanding the output
- container images and build files; Understanding the output
- container runtime
- Understanding the output
- Docker security operationsSummary; Chapter 5 : Monitoring and Reporting Docker Security Incidents; Docker security monitoring; Docker CVE; Mailing lists; Docker security reporting; Responsible disclosure; Security reporting; Additional Docker security resources; Docker Notary; Hardware signing; Reading materials; Awesome Docker; Summary; Chapter 6 : Using Docker's Built-in Security Features; Docker tools; Using TLS; Read-only containers; Docker security fundamentals; Kernel namespaces; Control groups; Linux kernel capabilities; Containers versus virtual machines