{"id":35931,"date":"2019-11-05T17:44:43","date_gmt":"2019-11-05T21:44:43","guid":{"rendered":"http:\/\/www.andysowards.com\/blog\/?p=35931"},"modified":"2019-11-05T17:44:43","modified_gmt":"2019-11-05T21:44:43","slug":"understanding-docker-syslog-systems-container-security","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/","title":{"rendered":"Understanding Docker Syslog Systems and Container Security"},"content":{"rendered":"<p>Businesses IT teams must set up multiple containers, and in doing so, they open themselves up to security risks. Whether you want to set up a WordPress container or a <a target=\"_blank\" href=\"https:\/\/www.papertrail.com\/solution\/docker-syslog\/\">Docker syslog server<\/a>, you have to be careful when creating and deploying any type of event repository. While this is incredibly efficient, this world of never-ending data breaches demands that businesses keep an eye on security. There are a few things that you can do ensure your servers remain more secure.<\/p>\n<h2>Pick Safe Third-Party Containers<\/h2>\n<p>Docker allows you to pull down multiple containers from different public repositories. Do you know who created the container? If not, do you really trust this third party? You may not be using a container that was created securely, which means that it could be susceptible to malware and other corrupt files.<\/p>\n<p>In this case, you should sign up for Docker Hub&#8217;s pain package. This is a service that ensures your repository has been scanned and does not have any corrupt or malicious files. For example, you may want to set up a WordPress container. To do this, you probably use a command sudo search for WordPress to find any irregular files or images on the server.<\/p>\n<h2>Set Up Content Trust<\/h2>\n<p><a href=\"https:\/\/nickjanetakis.com\/blog\/docker-tip-53-difference-between-a-registry-repository-and-image\" rel=\"noopener\" target=\"_blank\"><img decoding=\"async\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/docker-tip-53-difference-between-a-registry-repository-and-image.jpg\" alt=\"docker-tip-53-difference-between-a-registry-repository-and-image\" width=\"750\" height=\"422\" class=\"alignnone size-full wp-image-35934 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 750px; --smush-placeholder-aspect-ratio: 750\/422;\" \/><\/a><br \/>\n<em>Docker Tip #53: Difference between a Registry, Repository and Image<\/em><\/p>\n<p>If you do have a third-party image on your server that you&#8217;re not sure about, then as of the Docker 1.8 update, you can count on Content Trust. You can now <a target=\"_blank\" href=\"https:\/\/www.trusted.com\/check-authenticity\">verify authenticity<\/a>, publication date, and integrity of all the images that are also on the Docker Hub Registry. However, you have to enable this feature to check your images. Once you enable it, Docker won&#8217;t be able to pull down images that haven&#8217;t been signed and verified by the registry.<\/p>\n<p>You can enable this feature by inputting the following command:<\/p>\n<ul>\n<li>sudo export DOCKER_CONTENT_TRUST=1<\/li>\n<\/ul>\n<p>Docker will now inform you if you try to pull down any image that is not verified.<\/p>\n<h2>Containers Need Resource Limits<\/h2>\n<p><a href=\"https:\/\/dzone.com\/articles\/docker-container-resource-management-cpu-ram-and-i\" rel=\"noopener\" target=\"_blank\"><img decoding=\"async\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Containers-Need-Resource-Limits-docker-1024x640.jpg\" alt=\"Containers Need Resource Limits docker\" width=\"1024\" height=\"640\" class=\"alignnone size-large wp-image-35933 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/Containers-Need-Resource-Limits-docker-1024x640.jpg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/Containers-Need-Resource-Limits-docker-768x480.jpg 768w, https:\/\/www.andysowards.com\/blog\/assets\/Containers-Need-Resource-Limits-docker-320x200.jpg 320w, https:\/\/www.andysowards.com\/blog\/assets\/Containers-Need-Resource-Limits-docker.jpg 1920w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/640;\" \/><\/a><br \/>\n<em>Docker Container Resource Management: CPU, RAM and IO, Part 1<\/em><\/p>\n<p>In addition to image verification, you may also worry about containers that suddenly start to use up all of your host resources. If this happens, you may frantically <a target=\"_blank\" href=\"https:\/\/www.andysowards.com\/blog\/2019\/ways-businesses-can-seen-crowded-marketplace\/\">try to cut off your server<\/a>. However, you can actually prevent this problem before it even occurs by setting resource limits to individual containers. If you want to limit a container to 2GB of memory, then you can add this command option: &#8211;memory=&#8221;2000M&#8221;. You can also restrict the number of CPUs with another command: &#8211;cpus=2 (or whatever number you wish to limit the CPUs to).<\/p>\n<h2>Try a Free Third-Party Security Option<\/h2>\n<p>There are a few purpose-built security resources exclusively for Docker. You can use a tool like Twistlock, which offers a Docker security resource that has a seamless CI integration, security controls, and extensive API support. There is a free version and enterprise edition. If you need unlimited repositories, images, hosts, and 24\/7 support with automated policy creation and proprietary feeds for possible security breaches, then the enterprise is the best option.<\/p>\n<p>Docker offers amazing resources for those who want to secure their business and monitor their system logs with ease. You can also look at the Docker Security documentation to see how you can use other tools like Docker Bench Security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Businesses IT teams must set up multiple containers, and in doing so, they open themselves up to security risks. Whether you want to set up a WordPress container or a<\/p>\n","protected":false},"author":1,"featured_media":35932,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109,4206,49],"tags":[5891,7846,2649,235,311,2552,974,4368,11119,988,20,10096,7850,11117,3509,216,9652,1136,5888,177,182,5694,2483,227,11118,115],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Docker Syslog Systems and Container Security<\/title>\n<meta name=\"description\" content=\"Businesses IT teams must set up multiple containers, and in doing so, they open themselves up to security risks. Whether you want to set up a WordPress\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Docker Syslog Systems and Container Security\" \/>\n<meta property=\"og:description\" content=\"Businesses IT teams must set up multiple containers, and in doing so, they open themselves up to security risks. Whether you want to set up a WordPress\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-05T21:44:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/dockercon2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1184\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/\",\"name\":\"Understanding Docker Syslog Systems and Container Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/dockercon2019.jpg\",\"datePublished\":\"2019-11-05T21:44:43+00:00\",\"dateModified\":\"2019-11-05T21:44:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"Businesses IT teams must set up multiple containers, and in doing so, they open themselves up to security risks. Whether you want to set up a WordPress\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/dockercon2019.jpg\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/dockercon2019.jpg\",\"width\":1920,\"height\":1184},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Docker Syslog Systems and Container Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Docker Syslog Systems and Container Security","description":"Businesses IT teams must set up multiple containers, and in doing so, they open themselves up to security risks. Whether you want to set up a WordPress","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Docker Syslog Systems and Container Security","og_description":"Businesses IT teams must set up multiple containers, and in doing so, they open themselves up to security risks. Whether you want to set up a WordPress","og_url":"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2019-11-05T21:44:43+00:00","og_image":[{"width":1920,"height":1184,"url":"https:\/\/www.andysowards.com\/blog\/assets\/dockercon2019.jpg","type":"image\/jpeg"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/","url":"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/","name":"Understanding Docker Syslog Systems and Container Security","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/dockercon2019.jpg","datePublished":"2019-11-05T21:44:43+00:00","dateModified":"2019-11-05T21:44:43+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"Businesses IT teams must set up multiple containers, and in doing so, they open themselves up to security risks. Whether you want to set up a WordPress","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/dockercon2019.jpg","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/dockercon2019.jpg","width":1920,"height":1184},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2019\/understanding-docker-syslog-systems-container-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding Docker Syslog Systems and Container Security"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/35931"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=35931"}],"version-history":[{"count":1,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/35931\/revisions"}],"predecessor-version":[{"id":35935,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/35931\/revisions\/35935"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/35932"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=35931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=35931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=35931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}