Главная
Study mode:
on
1
Introduction
2
OVERVIEW
3
KERNEL ATTACKS
4
CONTAINER BREAKOUTS
5
SNIFFING SECRETS
6
LEAST PRIVILEGE
7
HOW TO MITIGATE
8
NOT A SOLUTION!
9
IMAGE SCANNING
10
USE CONTAINERS AND VMS
11
DOCKER PRIVILEGES
12
DROP CAPABILITIES
13
SET CPUSHARES
14
SET MEMORY LIMITS
15
DEFANG SETUID/SETGID BINARIES
16
USE MINIMAL IMAGES
17
USE LINUX SECURITY MODULES
18
SELINUX
19
SECURITY HARDENED KERNEL
20
VERIFY IMAGES
21
AUDITING
22
ENVIRONMENT VARIABLES
23
SECURE KEY-VALUE STORE
24
CONCLUSION
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore container security best practices in this 35-minute conference talk from GOTO Stockholm 2016. Delve into key concerns like kernel attacks, container breakouts, and secret sniffing. Learn mitigation strategies including least privilege principles, image scanning, and combining containers with VMs. Discover how to manage Docker privileges, set resource limits, use minimal images, and leverage Linux security modules. Gain insights on verifying images, implementing auditing, handling environment variables securely, and using key-value stores for sensitive data. Master essential techniques to enhance the security of your containerized applications.

Docker Security

GOTO Conferences
Add to list
0:00 / 0:00