Explore a 30-minute Docker session on mastering the container security model with Sysdig. Dive into critical security best practices for image builds and container execution, focusing on preventing excessive privileges, removing unused packages, avoiding credential leaks, and minimizing attack surfaces. Learn how to optimize containerized applications and implement a basic set of security practices for well-crafted containers and safe runtime configurations. Gain insights from Guillermo Palacio Oto, Product Analyst at Sysdig, on shifting security left and preventing security issues. Discover resources on rootless containers and connect with Docker's community across various social media platforms for continued learning and engagement.
Overview
Syllabus
Introduction
Containers
Shift Less Security
Containers running with escalated privileges
Unnecessary packages
Leaking credentials
Prevent unnecessary privileges
Taught by
Docker