10 Conquering container security with Docker

This chapter covers

  • Securing service-to-service communications with JWT and mTLS in a containerized environment
  • Managing secrets in a containerized environment
  • Signing and verifying Docker images with Docker Content Trust
  • Running Docker Bench for Security

The benefits of microservices architecture come at a cost. Unless you have the proper infrastructure to support microservices development and deployment with a CI/CD pipeline, chances are that you’ll more than likely fail to meet your objectives. Let us reiterate: one key objective of microservices architecture is the speed to production. With hundreds of microservices, management becomes a nightmare unless you have the right tools for automation. ...

Get Microservices Security in Action now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.