Cargando…

Securing Docker : learn how to secure your Docker environment and keep your environments secure irrespective of the threats out there /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gallagher, Scott (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2016.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover ; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Securing Docker Hosts; Docker host overview; Discussing Docker host; Virtualization and isolation; Attack surface of Docker daemon; Protecting the Docker daemon; Securing Docker hosts; Docker Machine; SELinux and AppArmor; Auto-patching hosts; Summary; Chapter 2 : Securing Docker Components; Docker Content Trust; Docker Content Trust components; Signing images; Hardware signing; Docker Subscription; Docker Trusted Registry; Installation; Securing Docker Trusted Registry
  • AdministeringWorkflow; Docker Registry; Installation; Configuration and security; Summary; Chapter 3 : Securing and Hardening Linux Kernels; Linux kernel hardening guides; SANS hardening guide deep dive; Access controls; Distribution focused; Linux kernel hardening tools; Grsecurity; Lynis; Summary; Chapter 4 : Docker Bench for Security; Docker security
  • best practices; Docker
  • best practices; CIS guide; Host configuration; Docker daemon configuration; Docker daemon configuration files; Container images/runtime; Docker security operations; The Docker Bench Security application
  • Running the toolRunning the tool
  • host configuration; Running the tool
  • Docker daemon configuration; Running the tool
  • Docker daemon configuration files; Running the tool
  • container images and build files; Running the tool
  • container runtime; Running the tool
  • Docker security operations; Understanding the output; Understanding the output
  • host configuration; Understanding the output
  • the Docker daemon configuration; Understanding the output
  • the Docker daemon configuration files; Understanding the output
  • container images and build files; Understanding the output
  • container runtime
  • Understanding the output
  • Docker security operationsSummary; Chapter 5 : Monitoring and Reporting Docker Security Incidents; Docker security monitoring; Docker CVE; Mailing lists; Docker security reporting; Responsible disclosure; Security reporting; Additional Docker security resources; Docker Notary; Hardware signing; Reading materials; Awesome Docker; Summary; Chapter 6 : Using Docker's Built-in Security Features; Docker tools; Using TLS; Read-only containers; Docker security fundamentals; Kernel namespaces; Control groups; Linux kernel capabilities; Containers versus virtual machines