Published: 07 January 2015
Summary
Security properties of containers are a largely unexplored field. In this comparison, security and risk management professionals can familiarize themselves with the security properties of containers by contrasting them to the controls of the Linux operating system and hypervisors.
Included in Full Research
- Resource Isolation
- Application and Process Isolation
- Isolation of Tenants
- Virtualization Primitives
- Device Isolation
- Kernel Instances and Number of Attack Surfaces
- Network Isolation
- Secure Administration and Management
- Granular Administration
- Administrative User Access
- Secure Management Protocols
- Detailed Statistics and Metering
- Support for Common Security Controls
- Data-at-Rest or File Encryption
- Endpoint Protection
- Workload Mobility
- Backup and Restore
- Secure Operations Management and Configuration Governance
- Accepted Controls and Best Practices for Regulatory Compliance
- Auditing and Logging
- Configuration Management
- Controls Natively Supported by Docker
- Security Contexts and Mandatory Access Controls
- Endpoint Protection
- Use Cases
- Docker for Convenient Solo Application Deployment
- Docker for Creating a Private PaaS Across One Trust Level
- Docker for Creating a Private PaaS or a Public PaaS Across Multiple Trust Levels