Summary
This chapter has been all about security, limiting risk when we're working with Docker and our container images, and how can we take our first steps with Docker security. We looked at the potential risks of running container processes as the root user and saw how we can make some minor changes to prevent these issues from arising if attackers were to access the running container. We then looked closer at how we can trust the images we are working with by using signing certificates for images and then implementing security scans on our Docker images.
At the end of this chapter, we started working with security profiles. We used two of the most common security profiles – AppArmor and seccomp
– implementing both on our Docker images and looking at the result of reducing specific access to the containers. The next chapter will look at implementing best practices when running and creating our Docker images.