From the course: Docker Certified Associate (DCA) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Container security - Docker Tutorial
From the course: Docker Certified Associate (DCA) Cert Prep
Container security
So, let's get started with Docker security. The containers are built with a base image, application libraries, and application code. Hence, there are possibilities that either of these may contain vulnerability. And when a container is vulnerable and it runs in production environment, it creates the scope of application or website breach. Therefore, before we run any containers in any environment, we should scan them. There are many tools available in the market to scan the Docker images. However, from the certification point of view, we will consider the Docker Trusted Registry. DTR helps in scanning the container image and it provides an option to scan when an image is being uploaded. The scanning can be done manually. However, the recommended way is to enable the scanning when the images are being pushed automatically. To configure DTR system, you may need a minimum of 8 GB RAM. So how do you do the scan from UI? You need to log in to the Docker Trusted Registry and configure it…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
(Locked)
Learning objective49s
-
(Locked)
Container security2m 9s
-
(Locked)
DTR webhooks54s
-
(Locked)
UCP client bundles1m 7s
-
(Locked)
LDAP1m 48s
-
(Locked)
Mutual Transport Layer Security (MTLS)4m 41s
-
(Locked)
Docker Content Trust (DCT)3m 9s
-
(Locked)
Namespaces1m 6s
-
(Locked)
Control groups1m 24s
-
(Locked)
Course summary36s
-
(Locked)