Best practices when working with Docker images

Shipshape

Conclusions

I have presented just a few of the best practices you might want to consider when working with Docker images and containers. If they seem too complicated, at least stick to vulnerability scans – these are mandatory in all scenarios. Don't think that because you are not using full systems like virtual machines you are safe: Hackers are increasingly attacking container infrastructure, including Kubernetes. Making sure your images don't contain any malicious code or grave vulnerabilities is an important part of keeping your setup secure.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=