Container security has been cited as a barrier to entry for containers, and specifically in the past, for Docker. This ebook explains how containers can facilitate a more secure environment by addressing topics such as image provenance, security scanning, isolation and least privilege, auditing and more.
In this guide, learn how to account for the temporary architectures, host-based persistence, multi-host storage, volume plugins, and storage strategies with the intent to show some of the patterns that have worked for others implementing container storage.
No comments:
Post a Comment