Docker allows teams to increase the speed and scale with which they can deliver software. As a result, adoption rates for Docker are accelerating as more organizations are looking for ways to innovate faster. We’ve written a lot about this new paradigm of proactive security in the recent past, so if you need to get up to speed quickly, check it out.
That said, as organizations move closer to adopting containers and embracing this new paradigm, it’s important to note that while an out-of-the box installation of just about any Linux distribution is capable of running the Docker daemon and Docker containers, if it’s not configured properly, it will leave your host exposed to many security and performance concerns.
Add to this observation the fact that our sales team is often asked questions on how to securely configure a Linux host to run containers. Questions like “How to set my server so it can run containers efficiently and securely?” and “How do I ensure Kubernetes or my other orchestration tools work well with my containers?” are fairly common across users, customers, and organizations. So we responded to these oft-asked question with two different responses, packaged as free downloadable content.
Download our Linux host configuration guide or watch our on demand Linux host configuration webinar to learn:
- Step by step instruction to configure a CentOS server and the operating system so that it is secure and robust, ready to run containers
- Instructions on how to check and minimize unused services to minimize the server’s attack surface
- Instructions on setting up the container engine with sensible defaults to minimize its attack surface
- And finally, instructions to configure integrations with existing enterprise security mechanisms such as SIEM systems, Active Directories, and other systems.
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
Baking Compliance in your CI/CD PipelineRead the Blog
Serverless Security Suggestions: Tips for Keeping Serverless Functions SecureRead the Blog
Why a Common Security Toolset is Essential for DevSecOpsRead the Blog
Putting the “Ops” in DevSecOps: Why It’s Hard and How to Do ItRead the Blog
Why the Point Solution Mindset for IT Security is DeadRead the Blog