Introduction
This chapter tries to tackle a subject that could have an entire book dedicated to it. We attempt to go part of the way in educating you on how to approach security with Docker. Previous chapters have given you a solid foundation in using Docker to build your applications, and this chapter hopes to use that information to also provide secure and stable containers for them to run on.
Docker and the microservices architecture allow us to start with a more secure and robust environment to manage our services, but that doesn't mean we need to completely forget about security. This chapter provides details on some of the aspects we need to consider when we are creating and maintaining services across our environments, as well as the ways in which you can start to implement these procedures in your working systems.
Docker security should not be separated from your regular IT security process, as the concepts will be the same. Docker has a different approach to handle...