Securing The Docker Host
HackerSploit
In this video, we will be taking a look at how to secure the Docker host OS and how to set up audit rules for various docker artifacts.
Timestamps 0:00 Introduction 1:30 What we will be covering 2:30 Best OS for hosting Docker 5:46 Minimal operating systems 6:50 The Linux audit framework 12:45 Auditing Tools 13:46 Practical Demonstration
LINKS: Docker Bench for Security: https://github.com/docker/docker-bench-security Lynis: https://cisofy.com/lynis/ Docker CIS Benchmark: https://www.cisecurity.org/benchmark/docker/
PART 2: Register for part 2 of the Docker security series here: https://bit.ly/3eziZi6 Learn more about the series here: https://bit.ly/3hPaukR Get $100 In free Linode credit: https://bit.ly/2VMM0Ab
BLOG ►► https://bit.ly/3qjvSjK FORUM ►► https://bit.ly/39r2kcY ACADEMY ►► https://bit.ly/39CuORr
TWITTER ►► https://bit.ly/3sNKXfq INSTAGRAM ►► https://bit.ly/3sP1Syh LINKEDIN ►► https://bit.ly/360qwlN PATREON ►► https://bit.ly/365iDLK MERCHANDISE ►► https://bit.ly/3c2jDEn
CYBERTALK PODCAST ►► https://open.spotify.com/show/6j0RhRiofxkt39AskIpwP7
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
Thanks for watching! Благодарю за просмотр! Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé Obrigado por assistir دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة
172022287 Bytes