Overview
Dive into a comprehensive 42-minute session on building secure Docker applications, exploring built-in security features and best practices for secure app development. Learn about Docker Content Trust Service, user authentication, CI/CD pipelines, vulnerability scanning, and secure deployment strategies. Discover how to implement zero trust networks, handle sensitive services, and utilize encrypted networks. Gain practical insights through a demo on production Swarm stack deployment and content trust implementation. Enhance your Docker security knowledge to create robust, protected applications from development to deployment.
Syllabus
Introduction
Docker Content Trust Service
Where did this code come from
User Authentication
CI
Unit Tests
Docker Security Scanning
Vulnerability Tracking
Deployment
Docker Microservices
Zero Trust Networks
Sensitive Services
Mutable Infrastructure
Secure Deployment
Network segregation
Encrypted networks
Demo
Production Swarm
Stack Deploy
Production Content Trust
Sensitive
Not Sensitive
Questions
Taught by
Docker