Docker offers a lot of advantages, simplifying both development and production environments, but there is still uncertainty around the security of containers. Drawing on his experience building Katacoda, a platform that provides users with a sandboxed and personalized learning playground—with the side effect that they can execute malicious code and hack the system from inside the container—Ben Hall walks you through implementing Docker and container security. You’ll learn about the Linux and Docker security model, its limitations, and how to maximize your container’s security.
Ben Hall is the founder of Ocelot Uproar, a company focused on building products loved by users. Ben has worked as a system administrator, tester, and software developer and launched several companies. He still finds the time to publish books and speak at conferences. Ben enjoys looking for the next challenges to solve, usually over an occasional beer. Ben recently launched Katacoda, an online learning environment for developers that helps break down the barriers to learning new technologies such as Docker and containers.
©2017, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • firstname.lastname@example.org