A summary on security and where to go next
The final section of this book, Docker Security – Securing Your Containers, was dedicated to the subject of security. First, we looked at how containers work with the underlying hardware from a security perspective. We studied container and hypervisor security models and quickly dipped our toes into security best practices.
Security fundamentals and best practices came next and provided us with guidance on the best approach to handling our Dockerfile and building minimal base images. After this, we looked at how secrets can be handled in Docker Swarm. This provided insight for readers who may need to maintain legacy systems or migrate from Swarm to Kubernetes. We also looked at how tags, metadata, and labels can be used from a security perspective.
The penultimate chapter of this book, Chapter 15, Scanning, Monitoring, and using Third-Party Tools, gave us a whistle-stop tour of Google, Amazon, and Microsoft's container security...