Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Docker Risk and Security
Prerequisites
Welcome to this program on Docker Risk and Security
Getting started with Docker
Business drivers for Docker
Learning objectives
How is Docker better: business reasons
Speeding up the platform
Real world Docker adoptions
Your turn: What do you see as advantages?
Additional resource: how to talk to the board on security
5 containers and a website
Introduction to the Docker example
Objectives and constraints
The architecture
Details of the implementation
The Docker Ecosystem
Learning objectives
The Docker container
The Docker image
The Docker daemon and host
The Docker registry and Docker hub
Docker networking
Docker orchestration
Continuous Delivery tooling and providers
Docker hosting
Docker security as a service
Non Docker Actors
Risks in the Docker ecosystem
Learning objectives
IT risks: definitions and examples
Bob the builder goes security
A few example risks
Collections of Docker risks
Additional resources
Security control areas
Learning objectives
Image provenance and quality
Credentials and secrets
Resource management
Isolation
Governance and operations
Wrapping up
Evaluation
Celebrate
Bonus section
How the NSA hacks you and what you can do about it
Teach online with
How is Docker better: business reasons
Docker is kind of a VM lite, or is it?
share OS: OS based virtualization (i.e. Linux)
more application delivery technology than virtualization tech:
https://blog.docker.com/2016/03/containers-are-not-vms
Business reasons
enables microservices
standardized runnable units
across environments DTAP (Development to Production)
Technical advantages
small memory footprint
boot much quicker
Background information
What is Docker?
https://www.docker.com/what-docker
Complete and Continue