O'Reilly logo

Docker: Creating Structured Containers by Scott Gallagher, Allan Espinosa, Russ McKendrick, Santosh Kumar Konduri, Vaibhav Kohli, Rajdeep Dua, Neependra Khare, Oskar Hane, Shrikrishna Holla, Vinod Singh, Jeeva S. Chelladhurai, Pethuru Raj

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Securing Docker with Third-Party Tools

In this chapter, let's take a look at securing Docker using third-party tools. These would be tools that are not part of the Docker ecosystem, which you can use to help secure your systems. We will be taking a look at the following three items:

  • Traffic Authorization: This allows inbound and outbound traffic to be verified by the token broker in order to ensure that traffic between services is secure.
  • Summon: Summon is a command-line tool that reads a file in the secrets.yml format and injects secrets as environment variables into any process. Once the process exits, the secrets are gone.
  • sVirt and SELinux: sVirt is a community project that integrates Mandatory Access Control (MAC) security and Linux-based ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required