Overview
Explore Windows container security in this 40-minute Docker presentation. Dive into platform architecture, Docker EE secure supply chain, and secure application zones. Examine runtime architecture, Windows Server containers, and kernel isolation. Learn about union file systems, container creation, and Hyper-V isolation. Understand memory, management, and storage architectures, including shared volumes and direct mapped files. Discover techniques for restricting memory and the Microsoft Hyper-V Bounty Program. Gain valuable insights on best practices and implementing a defense-in-depth approach to enhance your Windows container security strategy.
Syllabus
Intro
Platform Architecture
Docker EE Secure Supply Chain
Secure Application Zones
Runtime Architecture
Windows Server Containers
Kernel Isolation in Windows
Union File System
Container Creation
Hyper-V isolation
Memory architecture
Management architecture
Storage Architecture
Shared Volumes
Direct Mapped Files
Restricting Memory
Microsoft Hyper-V Bounty Program
Best Practices
Think Defense-in-Depth
Taught by
Docker