Security Risks and Challenges

Technical Report on Container Security (III)-2

December 11, 2018

Security Risks and Challenges—Security Threat Analysis

Security Threat Analysis

When we talk about security risks to containers, we mean security threats to hosts, to containers, and to the carried applications. (more…)

Technical Report on Container Security (III)-1

December 5, 2018

Security Risks and Challenges — Vulnerability and Security Risk Analysis

Vulnerability and Security Risk Analysis

As a specific implementation of the container technology, Docker is getting more and more popular in recent years. To some extent, Docker has become a typical representation of the container technology. Docker is based on the common client/server (C/S) architecture design as shown in Figure 3.1. In this architecture, the Docker daemon (server) runs on the Docker host and the Docker client sends requests to the daemon. This chapter uses Docker as an example to describe containers’ vulnerabilities and security risks. (more…)