How to Secure Docker Containers with a Read-Only Filesystem

Photo by Chepe Nicoli on Unsplash

A compromised website sucks. A compromised website that an attacker can insert code into to manipulate your visitors is even worse! Out-of-the-box, Docker containers provide some security advantages over running directly on the host, however Docker provides additional features to increase security. There is a little known flag in Docker that will convert a container’s files system to…

Director of Engineering at Mindsize. 20+ year technology veteran. Providing leadership insights, mentorship, and coaching to new and existing leaders.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Lessons from our customer survey

.py Tech Series — Day 2— What is PYthon and Steps for Installation / Online Editors.

How to build and deploy a lyrics generation model — framework agnostic

Symphony-Polly integration: Bridging the gap between machine and software for swifter insights in…

Elucidata Symphony-Polly integration

Architecture Diagram

Software Startup vs. Large Company

Building Your Own Kubernetes Operator Easily

Stones stacked on top of each other.

Fauci’s mention of different “platforms” may not have meant much to lay

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ben Lobaugh

Ben Lobaugh

Director of Engineering at Mindsize. 20+ year technology veteran. Providing leadership insights, mentorship, and coaching to new and existing leaders.

More from Medium

Docker Networks

Avoiding CI/CD dependency conflicts by using Containers

Allowing access to a Linux web app (app service) via Front Door using Terraform

Docker and Kubernetes essentials