Docker Security Technologies
Let's take a look at some of the major security technologies offered by the Docker.
We'll cover the following
Let's switch our focus to some of the security technologies Docker offers.
Swarm security
Docker Swarm lets you cluster multiple Docker hosts and manage applications declaratively. Every Swarm comprises manager nodes and worker nodes that can be Linux or Windows. Managers host the control plane and are responsible for configuring the cluster and dispatching work tasks. Workers run application containers.
Fortunately, swarm mode includes many security features that Docker automatically configures with sensible defaults. These include:
Cryptographic node IDs
TLS for mutual authentication
Secure join tokens
CA configuration with automatic certificate rotation
Encrypted cluster store
Encrypted networks
Let’s walk through building a secure swarm and configuring some of the security aspects.
If you’re following along, you’ll need three Docker hosts that can ping each other by name. The examples use three hosts called mgr1
, mgr2
, and wrk1
.
Configure a secure Swarm
Run the following command from the node you want to be the first manager. We’ll run the example from mgr1
.
Get hands-on with 1400+ tech skills courses.