Security Tips to run Docker in Production

preview_player
Показать описание
When you are designing a production environment security is essential. All the Docker ecosystem but in particular Docker Swarm allows us to ship our containers out of our laptop, how can we make this process safe? During my talk, I will share tips around production environment, immutability and how troubleshooting common attack as code injection with Docker. Static analysis of our images, content trust with Notary to make our journey secure.
How can we setup a cluster on the main cloud providers with VPN and node labeling to expose only a portion of our cluster? I will also show what Docker provides (Content Trust, Static Analysis) but also open source alternatives as Notary, centos/clair and Cilium. In the end of this talk, we had a better idea around how manage Docker in production.

Gianluca Arbezzano is Software Engineer at InfluxData. The main way to improve and grow is to share what you do to catch feedback to expand my points of view. I am an enthusiast open source contributor and maintainer of different projects in different languages. DevOps evangelist and Docker Captain I am happy to make my environment efficient and secure for me and my team.
Рекомендации по теме
Комментарии
Автор

this is a great intro talk that is very, very practical for people working in enterprises with scattered/nascent container envs where basically no one has any idea what they're doing

jonassteinberg
Автор

... very nice talk about docker security introducing a lot of possibilities to protect your docker container environment ... thanx for introduction the nice apparmor policy feature and the (great) cilium project as iptables overlay ... keep going on Giabluca Arbezzano :)

relicfrog
Автор

DevOps and Containers Security: Security and monitoring in Docker Containers
Through this book, we will introduce the DevOps tools ecosystem and the main containers orchestration tools through an introduction to some platforms such as Kubernetes, Docker Swarm, and OpenShift.Among other topics, both good practices will be addressed when constructing the Docker images as well as best security practices to be applied at the level of the host in which those containers are executed, from Docker's own daemon to the rest of the components that make up its technological stack.We will review the topics such as static analysis of vulnerabilities on Docker images, the signing of images with Docker Content Trust and their subsequent publication in a Docker Registry will be addressed.
Also, we will review the security state in Kubernetes. In the last section, we will review container management and administration open source tools for IT organizations that need to manage and monitor container-based applications, reviewing topics such as monitoring, administration, and networking in Docker.What will you learn:

● Learn fundamental DevOps skills and tools, starting with the basic components and concepts of Docker
● Learn about Docker as a platform for the deployment of containers and Docker images taking into account the security of applications
● Learn about tools that allow us to audit the security of the machine where we execute Docker images, finding out how to secure your Docker host
● Learn how to secure your Docker environment and discover vulnerabilities and threats in Docker images
● Learn about creating and deploying containers in a security way with Docker and Kubernetes
● Learn about monitoring and administration in Docker with tools such as cadvisor, sysdig, portainer, and Rancher.

JoseManuelOrtegadev