Summary
In this chapter, we covered some aspects of Docker security. First, we took a look at some of the things that you must consider when running containers (versus typical virtual machines) with regard to security. We looked at the advantages and your Docker host, and then we discussed image trust. We then took a look at the Docker commands that we can use for security purposes.
We launched a read-only container so that we could minimize any potential damage an intruder could do within our running containers. As not all "applications" lend themselves to running in read-only containers, we then looked at how we can track changes that have been made to the image since it was launched. It is always useful to be able to easily discover any changes that were made on the filesystem at runtime when trying to look into any problems.
Next, we discussed the Center for Internet Security guidelines for Docker. This guide will assist you in setting up multiple aspects of your...