Securing Docker Installation

Gupta Bless
4 min readJul 25, 2021

Before moving further to learn how to secure Docker, you must get familiar with the basics of Docker. you can do so by reading previous blog of mine on Docker, i.e.:

Understanding Docker

How to secure Docker?

Source

When we talk about Docker security, there are a couple ways that can be used to secure docker. The preferences depend upon the environment or how much experience does the admin have. Every Docker admin has their own ways but the major goal is to achieve security, reliability and efficiency of the infrastructure. We need to secure a couple of endpoints and some of the privileges that we need to minimize. There are some rules to secure clusters, let us discuss them one by one.

Rule 1: Security from the Escape Vulnerabilities

Lets first understand what are kernel escape vulnerabilities:

What kernel escapes vulnerability?

When malware infecting one computer escape to infect all other computers which are available on the network. This mostly happens when the applications are not running in an isolated environment, but using the bridged connection instead. So the malware…

--

--

Gupta Bless
Gupta Bless

Written by Gupta Bless

Security enthusiast working to secure web for others.

No responses yet