O'Reilly logo

Docker in Practice by Aidan Hobson Sayers, Ian Miell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Docker and security

This chapter covers

  • The level of security Docker offers out of the box
  • What Docker has done to help make it more secure
  • What other parties are doing about it
  • What other steps can be taken to ameliorate security concerns
  • How to manage users in a multi-tenant environment

As Docker makes clear in its documentation, access to the Docker API implies access to root privileges, which is why Docker must often be run with sudo, or the user must be added to a user group (which might be called docker or dockerroot) that allows access to the Docker API.

In this chapter we’re going to look at the issue of security in Docker.

10.1. Docker access and what it means

You may be wondering what sort of damage a user can ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required