Published on
In this module, we describe the various security threats that exist against Docker, Explore how threats could be used to compromise Docker hosts, including network sniffer, malicious payload inserted into a build in the pipeline, a vulnerable third-party package in an image, poisoning od an image in the registry, stealing secrets, and resources and resources starvation, and share the reasoning behind why you must harden Docker containers and container infrastructure.