So far, we have talked a lot about the fast emerging Docker technology in this book. It is not a nice and neat finish if Docker-specific security issues and solution approaches are not articulated in detail to you. Hence, this chapter is specially crafted and incorporated in this book in order to explain about the growing security challenges of Docker-inspired containers. We also wanted to throw more light on how lingering security concerns are being addressed through a host of pioneering technologies, high-quality algorithms, enabling tools, and best practices.
In this chapter, we are going to deal with the following topics in detail: