Best practices
In this section, we will look at best practices when it comes to Docker. Some of these we have already mentioned in previous chapters. We will then discuss the Center for Internet Security guide, which documents how to properly secure all aspects of your Docker environment.
Docker best practices
Before we dive into the Center for Internet Security guide, let's go over some of the best practices for using Docker, as follows:
- Only launch one application per container: Docker was built for this, and it makes everything easier, at the end of the day. The isolation that we discussed earlier is where this is key.
- Only install what you need: As we already covered in previous chapters, if you have to install more services to support the one process your container should be running, I would recommend that you review the reasons why. This not only keeps your images small and portable, but it also reduces the potential attack surface.
- Review who has access...