How to Securely Configure a Linux Host

This guide, as part of the Twistlock Container Security How-To Guides series, describes the concrete steps that you can follow to configure a Linux host to run Docker containers securely.
Key steps highlighted in this guide include:

How to start with a minimal installation of the OS and how to selectively add the services needed to run the container applications
How to configure the host security settings to harden and protect it from unauthorized access
How to configure and install a Docker Engine with sensible default settings to minimize the attack surface
How to ensure that the host has the necessary integration with existing enterprise systems like SIEM and enterprise directories

This complimentary download is offered by Twistlock.
Download Now