Linux containers provide convenient application packaging and run-time isolation in multi-tenant environments. However, the security implications of running containerized applications is often taken for granted. For example, today it is very easy to pull container images from the internet and run them in the enterprise without examining their content and authenticity.
In this lab, you’ll complete a series of hands-on exercises aimed at understanding the concepts, challenges and best practices associated with deploying containers in a secure fashion.
This lab session is a low-level, hands-on introduction to container security using the container tools included with Red Hat Enterprise Linux 8.
|10:00 - 10:10||Welcome and Introductions|
|10:10 - 10:30||Overview1|
|10:30 - 10:50||Overview2|
|10:50 - 11:00||Q&A|