{"title":"Docker安全:保护Docker容器的威胁模型和最佳实践","authors":"M. Patra, Anisha Kumari, B. Sahoo, A. K. Turuk","doi":"10.1109/iSSSC56467.2022.10051481","DOIUrl":null,"url":null,"abstract":"In recent years, virtualization technologies have seen dramatic growth in their levels of adoption. Because of this, the need for virtualization solutions that are both efficient and secure is becoming increasingly apparent. Virtualization technologies have emerged in the market in various forms, the most prominent of which are container and hypervisor-based virtualization. The demand for smaller development cycles, easier configuration management, continuous deployment and delivery, and cost reductions in cloud infrastructures led to the birth of containers. Containers are more versatile than VMs and give a better overall performance. Container-based virtualization has the potential to deliver a virtual environment that is lighter and more efficient, but it does not come without security problems. Docker is now the market leader among all container solutions. Docker is a platform that provides comprehensive packaging and software delivery. In this research, we analyze the security level of Docker, a well-known representative of container-based approaches. This research will also present Docker secure deployment guidelines. These guidelines will suggest different configurations to deploy Docker containers in a more secure way.","PeriodicalId":334645,"journal":{"name":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Docker Security: Threat Model and Best Practices to Secure a Docker Container\",\"authors\":\"M. Patra, Anisha Kumari, B. Sahoo, A. K. Turuk\",\"doi\":\"10.1109/iSSSC56467.2022.10051481\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, virtualization technologies have seen dramatic growth in their levels of adoption. Because of this, the need for virtualization solutions that are both efficient and secure is becoming increasingly apparent. Virtualization technologies have emerged in the market in various forms, the most prominent of which are container and hypervisor-based virtualization. The demand for smaller development cycles, easier configuration management, continuous deployment and delivery, and cost reductions in cloud infrastructures led to the birth of containers. Containers are more versatile than VMs and give a better overall performance. Container-based virtualization has the potential to deliver a virtual environment that is lighter and more efficient, but it does not come without security problems. Docker is now the market leader among all container solutions. Docker is a platform that provides comprehensive packaging and software delivery. In this research, we analyze the security level of Docker, a well-known representative of container-based approaches. This research will also present Docker secure deployment guidelines. These guidelines will suggest different configurations to deploy Docker containers in a more secure way.\",\"PeriodicalId\":334645,\"journal\":{\"name\":\"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iSSSC56467.2022.10051481\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iSSSC56467.2022.10051481","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Docker Security: Threat Model and Best Practices to Secure a Docker Container
In recent years, virtualization technologies have seen dramatic growth in their levels of adoption. Because of this, the need for virtualization solutions that are both efficient and secure is becoming increasingly apparent. Virtualization technologies have emerged in the market in various forms, the most prominent of which are container and hypervisor-based virtualization. The demand for smaller development cycles, easier configuration management, continuous deployment and delivery, and cost reductions in cloud infrastructures led to the birth of containers. Containers are more versatile than VMs and give a better overall performance. Container-based virtualization has the potential to deliver a virtual environment that is lighter and more efficient, but it does not come without security problems. Docker is now the market leader among all container solutions. Docker is a platform that provides comprehensive packaging and software delivery. In this research, we analyze the security level of Docker, a well-known representative of container-based approaches. This research will also present Docker secure deployment guidelines. These guidelines will suggest different configurations to deploy Docker containers in a more secure way.