Application containerization is one of the coolest technologies in IT. It solves numerous problems, allows for incredible application density, and can really increase flexibility and responsiveness.
There are some misconceptions about container security, though. In this session, Red Hat’s cloud evangelist, Thomas Cameron, will talk about the components of container security, some tips and tricks for planning a secure container environment, describe some “gotchas” about containers, and debunk some of the security myths about containers.
Attendees will learn:
- The basics of how containers work
- What containers are not
- Components of Container Security
- Kernel Namespaces
- Linux Control Groups
- The Docker Daemon
- Linux Kernal Capabilities
- Security Enhanced Linux
- Tips and Tricks
Attendees will learn about security for various components of containerization.