<img src="https://certify.alexametrics.com/atrk.gif?account=8w5fq1Fx9f207i" style="display:none" height="1" width="1" alt="">

This guide, as part of the Twistlock Container Security How-To Guides series, describes the concrete steps that you can follow to configure a Linux host to run Docker containers securely.

Key steps highlighted in this guide include:

  • How to start with a minimal installation of the OS and how to selectively add the services needed to run the container applications
  • How to configure the host security settings to harden and protect it from unauthorized access
  • How to configure and install a Docker Engine with sensible default settings to minimize the attack surface
  • How to ensure that the host has the necessary integration with existing enterprise systems like SIEM and enterprise directories

Download Now