To the best of my knowledge, this IS best practices.
Post by Jerald Sheets via AleYou solve this by only allowing an internal âhubâ where you place
âblessedâ container images. Â Done.
We blackhole docker hub internally, and there is no ingress to serving
nodes from the outside. Â In short, if you want something inside, it
has to go through a vetting process, and then I have to put it onto
the internal hub. Â Outside of that, nothing goes on a serving node
that isnât explicitly blessed on an almost file-by-file basis.
Docker is and can be secure. Â The problem is that most Systems folks
are too lazy to build the infrastructure to make it so.
âj
Post by Jim Kinney via AleDevs LOVE containers. SysAdmins hate them. They are difficult to
manage for updates (toss and rebuild) and most devs pull
latest-greatest libs even though they are all right from git repo and
not checked for problems. None of the security checks that exist for
vm control work for containers and they leak like screen door on a
submarine.
Good for development. Should be barred from production use.
From the article, seems most enterprises still use VMs and real hardware
for their production loads. Containers are mostly used for development
needs, not production.
https://www.theregister.co.uk/2018/01/08/container_shock_not_everybody_is_doing_it/
------------------------------------------------------------------------
Ale mailing list
http://mail.ale.org/mailman/listinfo/ale
See JOBS, ANNOUNCE and SCHOOLS lists at
http://mail.ale.org/mailman/listinfo
--
Sent from my Android device with K-9 Mail. All tyopes are thumb
related and reflect authenticity.
_______________________________________________
Ale mailing list
http://mail.ale.org/mailman/listinfo/ale
See JOBS, ANNOUNCE and SCHOOLS lists at
http://mail.ale.org/mailman/listinfo
_______________________________________________
Ale mailing list
http://mail.ale.org/mailman/listinfo/ale
See JOBS, ANNOUNCE and SCHOOLS lists at
http://mail.ale.org/mailman/listinfo