How to Securely Configure a Linux Host to Run Containers - Security Boulevard

How to Securely Configure a Linux Host to Run Containers

This guide, as part of the Twistlock Container Security How-To Guides series, describes the concrete steps that you can follow to configure a Linux host to run Docker containers securely.

Key steps highlighted in this guide include:

  • How to start with a minimal installation of the OS and how to selectively add the services needed to run the container applications
  • How to configure the host security settings to harden and protect it from unauthorized access
  • How to configure and install a Docker Engine with sensible default settings to minimize the attack surface
  • How to ensure that the host has the necessary integration with existing enterprise systems like SIEM and enterprise directories
Download Now

Charlene O’Hanlon

Charlene O’Hanlon is managing editor at Security Boulevard. She is an award-winning journalist serving the technology sector for 20 years as content director, executive editor and managing editor for numerous technology-focused sites including DevOps.com, CRN, The VAR Guy, ACM Queue and Channel Partners. She is also a frequent speaker at industry events and conferences.

charlene has 37 posts and counting.See all posts by charlene