Without the right tools and processes in place, Docker security can feel like a moving target. Learn four best practices for keeping deployments safe in this helpful TechTarget tutorial.


When it comes to container security, there are two key areas IT admins should emphasize: the container image and host. You can't, after all, secure one without the other.

At the end of the day, virtualized containers still run on a host system. A privilege escalation bug could compromise the security of the entire host and lead to loss of confidentiality, integrity and availability.

The good news is that IT admins can use freely available tools -- combined with a coherent build and test process -- to mitigate risks. To get started, embrace these four Docker security best practices.