This is code and configuration files for a series on getting hands on with Docker security & building a docker security program
- A simple example for illustrating security static analysis with Docker & Clair in the write up docker static analysis with Clair
- A look at HIDS models and container deployment best practices in Host Based Intrusion Prevention And Detection For Docker
The series walks through a hands on tutorial for Docker security, starting with a threat assessment, implementing security tooling, and building a comprehensive Docker security program.