Learn critical networking issues and advice for run-time container security
What you will learn in this technical overview:
- Top concerns for deploying containers in production
- Fundamentals of Docker container security
- A sample container exploit using the recently discovered Dirty COW vulnerability
- East-west traffic network issues on AWS and other clouds
- How NACLs, Sec Groups, and flow logs work or don't work with overlay networks
- Visualization and monitoring of containers during run-time.