We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
SAINTCON 2016 - Kevin Stultz - Docker Container Security
Discover the challenges and implications of container security in the post-traditional world, and learn how to adapt to the new realities of Docker and DevOps environments.
- Container security is different from traditional security approaches
- Docker introduced a new way of packaging software, making it easier to deploy and manage applications
- Containers have been widely adopted, with 12% of the Internet now running in containers
- The traditional approach to security doesn’t work in a containerized environment
- Containers are becoming more popular, especially in DevOps and cloud environments
- The role of the security team has changed, as they need to adapt to the new technologies and ways of doing things
- Containers are perceived as “stateless” and “unpatchable”, but this isn’t true
- Docker provides some security features, such as Docker Hub and Docker Registry, but more work needs to be done
- The limit registry access to sanctioned servers is a common and effective security practice
- Enforce internal registry use is another important security practice
- Isolating the containers from the host is critical for security
- BusyBox is a set of Unix tools that is commonly used in containers, but it’s not a registry like one would think of on Windows
- Non-Docker solutions and tools are emerging, such as DockerRun and a variety of other open-source tools
- The security best practices for containers are different from those for traditional systems
- The importance of driving adoption and acceptance of container security is crucial
- Docker has released a tool to manage containers on top of containers
- There is a growing need for container security tools that can work seamlessly with DevOps and automation
- The future of container security is exciting, with many new tools and solutions on the horizon