As the use of containers continues unabated, including in OpenStack projects like Kolla, Magnum, Kuryr, and others, it's important for developers and operators alike to understand where we stand in 2016 on container security. We had reviewed Docker engine security in a public cloud context at the OpenStack Tokyo Summit in 2015. A year has passed, and we want to look more broadly across the container ecosystem at recent security improvements and remaining open items.
We'll bring attendees up to speed on the core aspects of container security, and talk about ongoing work occurring in upstream open source communities since the Tokyo Summit. We'll also look at reports like the NCC Group report covering LXC, rkt, and Docker, noting valuable recommendations and topics along the way.
We will also discuss our own open source work to improve container security and to provide tools for improving application security for operators and developers alike.
Attendees will learn how isolation and secure capabilities are being added to various container execution platforms like LXC, rkt, and Docker, and what they should know about remaining weaknesses across these platforms as well as improvements that are underway for both host isolation, application isolation, and application security principles.