Summary
Over the course of this chapter, we learned about how VMs and Docker work in conjunction with the underlying operating system, hardware, and each other.
Following this, we explored the various features that Docker has implemented from Linux to bake in security concerns.
Finally, we looked at some best practices that apply regardless of the applications we are developing. Now, let's jump into some security fundamentals and learn about Docker image security, commands, and the build process in the next chapter.