DEV Community

José Manuel Ortega
José Manuel Ortega

Posted on

DevOps and Containers Security: Security and Monitoring in Docker Containers

https://www.amazon.es/dp/B085NMP3CV/

Alt Text

Through this book, we will introduce the DevOps tools ecosystem and the main containers orchestration tools through an introduction to some platforms such as Kubernetes, Docker Swarm, and OpenShift.
Among other topics, both good practices will be addressed when constructing the Docker images as well as best security practices to be applied at the level of the host in which those containers are executed, from Docker’s own daemon to the rest of the components that make up its technological stack.
We will review the topics such as static analysis of vulnerabilities on Docker images, the signing of images with Docker Content Trust and their subsequent publication in a Docker Registry will be addressed. Also, we will review the security state in Kubernetes.
In the last section, we will review container management and administration open source tools for IT organizations that need to manage and monitor container-based applications, reviewing topics such as monitoring, administration, and networking in Docker.
What will you learn
● Learn fundamental DevOps skills and tools, starting with the basic components and concepts of Docker.
● Learn about Docker as a platform for the deployment of containers and Docker images taking into account the security of applications.
● Learn about tools that allow us to audit the security of the machine where we execute Docker images, finding out how to secure your Docker host.
● Learn how to secure your Docker environment and discover vulnerabilities and threats in Docker images.
● Learn about creating and deploying containers in a security way with Docker and Kubernetes.
● Learn about monitoring and administration in Docker with tools such as cadvisor, sysdig, portainer, and Rancher.
Table of Contents

  1. Getting started with DevOps
  2. Container platforms
  3. Managing Containers and Docker images
  4. Getting started with Docker security
  5. Docker host security
  6. Docker images security
  7. Auditing and analyzing vulnerabilities in Docker containers
  8. Kubernetes security
  9. Docker container networking
  10. Docker container monitoring
  11. Docker container administration

Latest comments (0)