Securing Docker Installation
Before moving further to learn how to secure Docker, you must get familiar with the basics of Docker. you can do so by reading previous blog of mine on Docker, i.e.:
How to secure Docker?
When we talk about Docker security, there are a couple ways that can be used to secure docker. The preferences depend upon the environment or how much experience does the admin have. Every Docker admin has their own ways but the major goal is to achieve security, reliability and efficiency of the infrastructure. We need to secure a couple of endpoints and some of the privileges that we need to minimize. There are some rules to secure clusters, let us discuss them one by one.
Rule 1: Security from the Escape Vulnerabilities
Lets first understand what are kernel escape vulnerabilities:
What kernel escapes vulnerability?
When malware infecting one computer escape to infect all other computers which are available on the network. This mostly happens when the applications are not running in an isolated environment, but using the bridged connection instead. So the malware…