So far, we have talked a lot about the fast-evolving Docker technology in this book. It is not a nice and neat finish if the Docker-specific security issues and solution approaches are not articulated in detail to you. Hence, this chapter is specially crafted and incorporated into this book in order to explain all about the security challenges of Docker-inspired containerization. We also wanted to throw more light on how the lingering security concerns are being addressed through a host of pioneering technologies, high-quality algorithms, enabling tools, and best practices. In this chapter, we will deal with the following crucial topics in detail:
- Are the Docker containers secure?
- The security features of containers
- The emerging security-enabling approaches
- The best practices for ensuring container security