In this chapter, we covered some aspects of Docker security. First, we took a look at some of the things that you must consider when running containers (versus typical virtual machines), with regards to security. We looked at the advantages and your Docker host, and then we discussed image trust. We then took a look at the Docker commands that we can use for security purposes.
We launched a read-only container, so that we can minimize any potential damage an intruder can do within our running containers. As not all applications lend themselves to running in read-only containers, we then looked at how we can track changes that have been made to the image since it was launched. It is always useful to be able to easily discover any changes that were made on the filesystem at runtime, when trying to look into any problems.
Next, we discussed the Center for Internet Security...