Chapter 8. Security, Challenges, and Conclusions

In this, our final chapter, we are going to be looking at all of the tools we have covered in this book and answering the following questions:

  • How the tools can affect the security of your Docker installation?
  • How they can work together and when should they be used?
  • What problems and challenges can the tools be used to resolve?

Securing your containers

So far, we have quite happily been pulling images from the Docker Hub without much thought as to who created them or what is actually installed. This hasn't been too much of a worry as we have been creating ad-hoc environments to launch the containers in.

As we move towards production and resolving the worked in dev problem, it starts to become important ...

Get Extending Docker now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.