Container Myths Debunked (Redux)

Container Myths Debunked (Redux)

Background So lately, I have been hearing a lot about containers vs. virtual machines and I wanted to get in on the action. I saw the a recap of Alex Polvi’s session at OpenStack Silicon Valley and I was inspired. I agree with Alex, and for fun, I wanted to state all of his points

Meeting the CIS Docker Benchmark with RHEL7 and RHEL Atomic

Meeting the CIS Docker Benchmark with RHEL7 and RHEL Atomic

Background As part of my blog series on Running Docker in Production, I have been writing about Docker security. Coincidentally, the CIS Docker 1.6 Benchmark v1.0.0 was released at the end of May and I thought it would be fun to tackle this new security benchmark. The CIS Docker Benchmark is meant to be a

Running Docker in Production

Running Docker in Production

Background This blog series is focused on programmers, systems administrators, and application administrators that want to run Docker in production. The subject matter ranges from workflow and practical guidelines to security and best practices in manageability.   A Practical Introduction to Docker Containers A Practical Introduction to the Docker Registry Server Core Builds in the

Securing Docker Containers with sVirt and Trusted Sources

Securing Docker Containers with sVirt and Trusted Sources

Background As has been stated before, Docker containers do not contain all of the parts of the operating system necessary to be considered secure. That said, the advantages of using them is so compelling that many companies, large and small, have began to investigate how to run containers in a production environment. I would argue