Chapter 7. Securing Docker with Third-Party Tools
In this chapter, let's take a look at securing Docker using third-party tools. These would be tools that are not part of the Docker ecosystem, which you can use to help secure your systems. We will be taking a look at the following three items:
- Traffic Authorization: This allows inbound and outbound traffic to be verified by the token broker in order to ensure that traffic between services is secure.
- Summon: Summon is a command-line tool that reads a file in the
secrets.yml format and injects secrets as environment variables into any process. Once the process exits, the secrets are gone.
- sVirt and SELinux: sVirt is a community project that integrates Mandatory Access Control (MAC) security and Linux-based ...