---
# LinuxCon+ContainerCon Europe 2016: Berlin: Container Defense in Depth
**URL:** https://crunchtools.com/linuxconcontainercon-europe-2016-berlin-container-defense-in-depth/
Date: 2016-10-05
Author: fatherlinux
Post Type: post
Summary: This presentation is a 16 slide introduction to what must be thought about when building a production cloud. Proper image management is critical engineering task.Continue Reading "LinuxCon+ContainerCon Europe 2016: Berlin: Container Defense in Depth" →
Categories: Presentations
Tags: Best Practices, Container Engines, Container Tools, Security
Featured Image: https://crunchtools.com/wp-content/uploads/2016/10/LinuxCon-ContainerCon-Europe-2016.jpg
---
## Abstract
Defense in depth is an information assurance technique used to protect a system from any particular attack - use of blended countermeasures, working together to meet control and governance requirements. In a containerized world, defense in depth is applied by thinking about security within a container, on the container host and at the container platform layer.
This talk will cover numerous technologies and practices at each layer - from kernel quality, SELinux (svirt), SECCOMP, and use of root, to measuring attack surface, patch remediation, and platform level authentication/authorization, these are the droids you are looking for.
This talk will help an end user understand the breadth of tooling that is available at each level and how they will help protect their system from intrusions and compromises.
## Presentation
- [Google Slides](https://docs.google.com/presentation/d/1Fs32kRG2FhbeO_-WdYSdP2dauepeo_VV5R69Q_xZeYo/edit#slide=id.g167dd20c9e_3_14)
- [Sched](https://linuxconcontainerconeurope2016.sched.com/speaker/scottmccarty)
- [PDF](http://crunchtools.com/wp-content/uploads/2020/06/The-security-implications-of-running-software-in-containers.pdf)
- [The New Stack Blog](https://thenewstack.io/container-defense-depth/)
---
## Categories
- Presentations
---
## Navigation
- [Home](https://crunchtools.com/)
- [Articles](https://crunchtools.com/category/articles/)
- [Events](https://crunchtools.com/category/events/)
- [News](https://crunchtools.com/category/news/)
- [Presentations](https://crunchtools.com/category/presentations/)
- [Software](https://crunchtools.com/software/)
- [Beaver Backup](https://crunchtools.com/software/beaver-backup/)
- [Check BGP Neighbors](https://crunchtools.com/software/check-bgp-neighbors-nagios/)
- [Chev](https://crunchtools.com/software/chev-check-vulnerabilities-script/)
- [Graph BGP Neighbors](https://crunchtools.com/software/grpah-bgp-neighbors/)
- [Graph MySQL Stats](https://crunchtools.com/software/graph-mysql-stats/)
- [Graph Sockets Pipes Files](https://crunchtools.com/software/graph-sockets-pipes-files/)
- [MCP Servers](https://crunchtools.com/software/mcp-servers/)
- [Petit](https://crunchtools.com/software/petit/)
- [Racecar](https://crunchtools.com/software/racecar/)
- [Shiva](https://crunchtools.com/software/shiva/)
- [About](https://crunchtools.com/about/)
- [Home](https://crunchtools.com)
## Tags
- Best Practices
- Container Engines
- Container Tools
- Security