Docker allows teams to increase the speed and scale with which they can deliver software. As a result, adoption rates for Docker are accelerating as more organizations are looking for ways to innovate faster. We’ve written a lot about this new paradigm of proactive security in the recent past, so if you need to get up to speed quickly, check it out.
That said, as organizations move closer to adopting containers and embracing this new paradigm, it’s important to note that while an out-of-the box installation of just about any Linux distribution is capable of running the Docker daemon and Docker containers, if it’s not configured properly, it will leave your host exposed to many security and performance concerns.
Add to this observation the fact that our sales team is often asked questions on how to securely configure a Linux host to run containers. Questions like “How to set my server so it can run containers efficiently and securely?” and “How do I ensure Kubernetes or my other orchestration tools work well with my containers?” are fairly common across users, customers, and organizations. So we responded to these oft-asked question with two different responses, packaged as free downloadable content.
Download our Linux host configuration guide or watch our on demand Linux host configuration webinar to learn:
- Step by step instruction to configure a CentOS server and the operating system so that it is secure and robust, ready to run containers
- Instructions on how to check and minimize unused services to minimize the server’s attack surface
- Instructions on setting up the container engine with sensible defaults to minimize its attack surface
- And finally, instructions to configure integrations with existing enterprise security mechanisms such as SIEM systems, Active Directories, and other systems.
Follow us on Twitter
Keep up to date with the latest news from TwistlockLabs and TwistlockTeam.
Twistlock Releases Serverless Runtime Defense
A few months ago, we wrote a piece on “The Continuum of Cloud Native...
Why DevSecOps is No Longer Optional
DevSecOps has been a hot topic within tech conversations for a few yea...
Better Together: Announcing The Twistlock Advantage Program
It’s been about three years since we exited stealth with the first g...
My Security Toolset Today Vs 10 Years Ago
It can be easy to forget how sophisticated IT security tools are today...
How to crash the Linux Kernel with a CDROM interaction – CVE-2018-11506
I’ve recently discovered and reported a buffer overflow vulnerabilit...