Securing the Docker Platform
The Docker platform is a key ingredient in the packaging and delivery of container-based application services. This course will give you all the knowledge you need to enable you to securely manage the operation of a Docker platform.
What you'll learn
Docker containers are in widespread use as the distribution vehicle for cloud native application services. An important enabler in the process of building, packaging, and running those containers is the Docker platform, which is comprised of several parts. In this course, Securing the Docker Platform, you'll learn about the fundamental aspects of security that relate to the platform components. First, you'll gain a better understanding of the platform components involved and the means of measuring compliance against an industry benchmark standard. Next, you'll discover how to configure the Docker daemon for best practice security, as well as for more flexible access control and authentication. Finally, you'll explore how to apply security controls to other aspects of the platform including a self-hosted Docker registry and a Swarm cluster. By the end of this course, you'll have the necessary knowledge to configure, measure, and optimize effective Docker platform security.
Table of contents
- Module Outline 2m
- Enabling the Use of Insecure Registries 6m
- Securing Communication with a Self-hosted Docker Registry 7m
- Configuring TLS for the Docker Daemon and Registry 11m
- Controlling Access with Basic Authentication 7m
- Controlling Access with Token-based Authentication 5m
- Implementing Authentication for a Self-hosted Registry 11m
- Module Summary 2m