How to secure Docker: Explore Attack Vectors and Mitigations | Container Security | Part 8

preview_player
Показать описание
Here's the next episode in our AppSecEngineer Hands-On Labs Walkthrough Series!

In this series, we’ll start by diving deep into Docker – understanding what it is and why it’s become an essential tool in modern software development.

In this video, we dive deep into the security aspects of Docker. We’ll explore various ways to attack Docker containers and implementations, starting with a high-level threat model. Learn about common attack vectors, including container breakouts, Trojanized Docker images, and attacks on the Docker daemon. Join us as we demonstrate practical examples and discuss methods to prevent these attacks. Get hands-on experience with securing your Docker environment and fortifying your containerized applications.

Don't forget to hit the subscribe button and click the bell icon so you don't miss any of our upcoming episodes.

#docker #container #containersecurity #cybersecurity #appsec #infosec #infosectraining #developer #securityengineer #applicationsecurit
Рекомендации по теме