Главная
Study mode:
on
1
Intro
2
Who am I
3
What is Docker
4
Flexibility
5
Systemd v Docker
6
Container can span multiple hosts
7
Containers contain dependencies
8
Security benefits
9
User name spaces
10
Security concerns
11
High priority vulnerabilities
12
What do we do with this
13
Security vs DevOps
14
For Phase Approach
15
Defining Standards
16
Automated Scanners
17
Continuous Controls
18
Tools
19
CyberE
20
Other Cool Stop
21
Contact Information
22
QA
Description:
Explore Docker container security in this 46-minute conference talk from Louisville InfoSec 2016. Delve into the fundamentals of Docker, its flexibility, and system architecture. Examine the security benefits of containers, including user namespaces, while addressing potential vulnerabilities and concerns. Learn about balancing security with DevOps practices through a four-phase approach: defining standards, implementing automated scanners, establishing continuous controls, and utilizing tools like CyberE. Gain valuable insights on securing Docker containers and enhancing your organization's overall security posture.

Securing Docker Containers

Add to list
0:00 / 0:00