Chapter 11: Securing Containers
Security is becoming the hottest topic of current times. Enterprises and companies all over the world are making huge investments in security practices and tools that should help protect their systems from internal or external attacks.
As we saw in Chapter 1, Introduction to Container Technology, containers and their host systems can be considered a medium to execute and keep a target application running. Security should be applied to all levels of the service architecture, from the base infrastructure to the target application code, all while passing through the virtualization or containerization layer.
In this chapter, we will look at the best practices and tools that could help improve the overall security of our containerization layer. In particular, we're going to cover the following main topics:
- Running rootless containers with Podman
- Do not run containers with UID 0
- Signing our container images
- Customizing Linux...