·DevOps
Module 10 Lesson 5: Securing Container Comms
Master the 'Zero Trust' model for containers. Learn how to encrypt inter-container traffic and use network policies to prevent unauthorized lateral movement.
4 articles
Master the 'Zero Trust' model for containers. Learn how to encrypt inter-container traffic and use network policies to prevent unauthorized lateral movement.
Fortify your containers. Explore the 'Top 10' security practices for hardening Docker images and runtimes against modern threats.
Break the 'Root' habit. Learn why running containers as the administrator is the biggest risk in Docker and how to implement a secure USER instruction.
Detect the invisible threats. Learn how to use static and dynamic scanning tools to find 'Common Vulnerabilities and Exposures' (CVEs) in your base images and libraries.