Security is crucial when you are running applications in production. We have learned about many security features provided by Docker and its components. We started by reviewing how containers are isolated from other host processes and we also learned how we can ensure security in Docker Engine. Then, we moved on to Docker Swarm, where security must be applied cluster-wide. Users' access must also be managed and we need to provide authentication and authorization mechanisms. Docker Enterprise provides a higher level of security. It includes a complete RBAC environment, which allows us to manage fine-grained permissions to objects and cluster resources.
All of these topics were covered in multiple chapters on Docker Engine, Docker Swarm, Kubernetes, and the Docker Enterprise platform. We learned about security in Chapter 1, Modern Infrastructures and Applications with Docker, Chapter 2, Building Docker Images, Chapter 4, Container...