Docker allows teams to increase the speed and scale with which they can deliver software. As a result, adoption rates for Docker are accelerating as more organizations are looking for ways to innovate faster. We’ve written a lot about this new paradigm of proactive security in the recent past, so if you need to get up to speed quickly, check it out.
That said, as organizations move closer to adopting containers and embracing this new paradigm, it’s important to note that while an out-of-the box installation of just about any Linux distribution is capable of running the Docker daemon and Docker containers, if it’s not configured properly, it will leave your host exposed to many security and performance concerns.
Add to this observation the fact that our sales team is often asked questions on how to securely configure a Linux host to run containers. Questions like “How to set my server so it can run containers efficiently and securely?” and “How do I ensure Kubernetes or my other orchestration tools work well with my containers?” are fairly common across users, customers, and organizations. So we responded to these oft-asked question with two different responses, packaged as free downloadable content.
Download our Linux host configuration guide or watch our on demand Linux host configuration webinar to learn:
- Step by step instruction to configure a CentOS server and the operating system so that it is secure and robust, ready to run containers
- Instructions on how to check and minimize unused services to minimize the server’s attack surface
- Instructions on setting up the container engine with sensible defaults to minimize its attack surface
- And finally, instructions to configure integrations with existing enterprise security mechanisms such as SIEM systems, Active Directories, and other systems.
Follow us on Twitter
Keep up to date with the latest news from TwistlockLabs and TwistlockTeam.
Multiple Registry Scanners: 2.4 Deep Dive
At Twistlock, we’ve watched our customers implement security through...
The Challenges of Securing and Protecting Containers During Runtime
Containers deliver many advantages over virtual machines, but they als...
Infinite Scale and Multitenancy with Projects: 2.4 Deep Dive
At Twistlock, we’re working with enterprises across almost every ind...
Twistlock 2.4 Release Notes
Announcing Twistlock 2.4 We just signed off on Twistlock 2.4, the 13th...
5 Ways to Solve for Enterprise Cloud Security Challenges and Risks
Infrastructure as a Service (IaaS) clouds present a somewhat unique se...