Securing Docker

 
 
Packt Publishing Limited
  • 1. Auflage
  • |
  • erschienen am 30. März 2016
  • |
  • 126 Seiten
 
E-Book | ePUB mit Adobe DRM | Systemvoraussetzungen
978-1-78588-196-1 (ISBN)
 
Learn how to secure your Docker environment and keep your environments secure irrespective of the threats out thereAbout This BookGain confidence in using Docker for containerization without compromising on securityThis book covers different techniques to help you develop your container security skillsIt is loaded with practical examples and real-world scenarios to secure your container-based applicationsWho This Book Is ForThis book is for developers who wish to use Docker as their testing platform as well as security professionals who are interested in securing Docker containers. You must be familiar with the basics of Docker.What You Will LearnFind out how to secure your Docker hosts and nodesSecure your Docker componentsExplore different security measures/methods for Linux kernelsInstall and run the Docker Bench security applicationMonitor and report security issuesFamiliarize yourself with third-party tools such as Traffic Authorization, Summon, sVirt, and SELinux to secure your Docker environmentIn DetailWith the rising integration and adoption of Docker containers, there is a growing need to ensure their security.The purpose of this book is to provide techniques and enhance your skills to secure Docker containers easily and efficiently. The book starts by sharing the techniques to configure Docker components securely and explore the different security measures/methods one can use to secure the kernel.Furthermore, we will cover the best practices to report Docker security findings and will show you how you can safely report any security findings you come across. Toward the end, we list the internal and third-party tools that can help you immunize your Docker environment.By the end of this book, you will have a complete understanding of Docker security so you are able to protect your container-based applications.Style and approachThis book is your one-stop solution to resolve all your Docker security concerns. It will familiarize you with techniques to safeguard your applications that run on Docker containers.
  • Englisch
  • Birmingham
  • |
  • Großbritannien
978-1-78588-196-1 (9781785881961)
1785881965 (1785881965)
weitere Ausgaben werden ermittelt
Scott Gallagher has been fascinated with technology since he was in elementary school, when he used to play Oregon Trail. His love continued through middle school, working on more Apple IIe computers. In high school, he learned how build computers and program in BASIC! His college years were all about server technologies such as Novell, Microsoft, and Red Hat. After college, he continued to work on Novell, all while keeping an interest in all the technologies. He then moved into managing Microsoft environments and eventually into what he is the most passionate about, Linux environments, and now his focus is on Docker and cloud environments.
  • Cover
  • Copyright
  • Credits
  • About the Author
  • About the Reviewer
  • www.PacktPub.com
  • Table of Contents
  • Preface
  • Chapter 1: Securing Docker Hosts
  • Docker host overview
  • Discussing Docker host
  • Virtualization and isolation
  • Attack surface of Docker daemon
  • Protecting the Docker daemon
  • Securing Docker hosts
  • Docker Machine
  • SELinux and AppArmor
  • Auto-patching hosts
  • Summary
  • Chapter 2 : Securing Docker Components
  • Docker Content Trust
  • Docker Content Trust components
  • Signing images
  • Hardware signing
  • Docker Subscription
  • Docker Trusted Registry
  • Installation
  • Securing Docker Trusted Registry
  • Administering
  • Workflow
  • Docker Registry
  • Installation
  • Configuration and security
  • Summary
  • Chapter 3 : Securing and Hardening Linux Kernels
  • Linux kernel hardening guides
  • SANS hardening guide deep dive
  • Access controls
  • Distribution focused
  • Linux kernel hardening tools
  • Grsecurity
  • Lynis
  • Summary
  • Chapter 4 : Docker Bench for Security
  • Docker security - best practices
  • Docker - best practices
  • CIS guide
  • Host configuration
  • Docker daemon configuration
  • Docker daemon configuration files
  • Container images/runtime
  • Docker security operations
  • The Docker Bench Security application
  • Running the tool
  • Running the tool - host configuration
  • Running the tool - Docker daemon configuration
  • Running the tool - Docker daemon configuration files
  • Running the tool - container images and build files
  • Running the tool - container runtime
  • Running the tool - Docker security operations
  • Understanding the output
  • Understanding the output - host configuration
  • Understanding the output - the Docker daemon configuration
  • Understanding the output - the Docker daemon configuration files
  • Understanding the output - container images and build files
  • Understanding the output - container runtime
  • Understanding the output - Docker security operations
  • Summary
  • Chapter 5 : Monitoring and Reporting Docker Security Incidents
  • Docker security monitoring
  • Docker CVE
  • Mailing lists
  • Docker security reporting
  • Responsible disclosure
  • Security reporting
  • Additional Docker security resources
  • Docker Notary
  • Hardware signing
  • Reading materials
  • Awesome Docker
  • Summary
  • Chapter 6 : Using Docker's Built-in Security Features
  • Docker tools
  • Using TLS
  • Read-only containers
  • Docker security fundamentals
  • Kernel namespaces
  • Control groups
  • Linux kernel capabilities
  • Containers versus virtual machines
  • Summary
  • Chapter 7 : Securing Docker with Third-party Tools
  • Third-party tools
  • Traffic Authorization
  • Summon
  • sVirt and SELinux
  • Other third-party tools
  • dockersh
  • DockerUI
  • Shipyard
  • Logspout
  • Summary
  • Chapter 8 : Keeping up Security
  • Keeping up with security
  • E-mail list options
  • The two e-mail lists are as follows:
  • GitHub issues
  • IRC rooms
  • CVE websites
  • Other areas of interest
  • Summary
  • Index

Dateiformat: EPUB
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat EPUB ist sehr gut für Romane und Sachbücher geeignet - also für "fließenden" Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

32,73 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
ePUB mit Adobe DRM
siehe Systemvoraussetzungen
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok