Mitigating Docker Security Issues

04/13/2018
by   Robail Yasrab, et al.
0

It is very easy to run applications in Docker. Docker offers an ecosystem that offers a platform for application packaging, distributing and managing within containers. However, Docker platform is yet not matured. Presently, Docker is less secured as compare to virtual machines (VM) and most of the other cloud technologies. The key of reason of Docker inadequate security protocols is containers sharing of Linux kernel, which can lead to risk of privileged escalations. This research is going to outline some major security vulnerabilities at Docker and counter solutions to neutralize such attacks. There are variety of security attacks like insider and outsider. This research will outline both types of attacks and their mitigations strategies. Taking some precautionary measures can save from huge disasters. This research will also present Docker secure deployment guidelines. These guidelines will suggest different configurations to deploy Docker containers in a more secure way.

READ FULL TEXT

page 1

page 6

page 10

research
09/13/2018

A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing

Cloud computing is a new model of computing which provides scalability, ...
research
04/12/2018

MPSM: Multi-prospective PaaS Security Model

Cloud computing has brought a revolution in the field of information tec...
research
07/28/2020

Coding Practices and Recommendations of Spring Security for Enterprise Applications

Spring security is tremendously popular among practitioners for its ease...
research
12/03/2022

Open RAN Security: Challenges and Opportunities

Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RA...
research
05/28/2022

Towards a Security Stress-Test for Cloud Configurations

Securing cloud configurations is an elusive task, which is left up to sy...
research
09/08/2017

FreeGuard: A Faster Secure Heap Allocator

In spite of years of improvements to software security, heap-related att...
research
03/30/2020

5G Security and Privacy: A Research Roadmap

Cellular networks represent a critical infrastructure and their security...

Please sign up or login with your details

Forgot password? Click here to reset