Docker Security - Secure Container Deployment on Linux

Michael Boelen
Michael BoelenProviding companies a software solution to audit their systems (Linux, macOS, UNIX) um CISOfy
Docker Security
Secure container deployment on Linux
openSUSE conference, The Hague, 3 May 2015
Michael Boelen
michael.boelen@cisofy.com
Michael Boelen
● Founder of CISOfy
● Security + Open Source
○ Rootkit Hunter (malware scan)
○ Lynis (security scan)
● Analysis → Simplify
2
Docker and Me
● Understanding
● Development
● Using it
3
Results of Research
● Limited resources
● Outdated articles
● Conflicting information
● Security not important?
Proposal: Let's fix (some of) these issues
4
Proposal
Security proposals
● Tooling to simplify Linux security → Lynis
● Articles about Docker security → Blog posts
● Provide input to (GitHub) projects → You
● Presentations → In progress
5
What
● Stabilize the vessel
● Secure containers
6
How
➔ Benefits
➔ Risks
➔ Defenses
➔ Best Practices
7
Photo credits: imagebase.net
Why?
Data!
8
Why Security?
Data!
● Docker + Software = Data Sharing
● Keep it confidential
9
Warning
From this point on,
there might be lies...
10
Docker Benefits
11
Primary Benefits
● Flexibility
● Scalability
● Better testing
12
Segregation
● The art of splitting up things
● The "Holy Grail" of security
● Smaller units = more control
13
Granular Control
● Limit users, access and data
● Easier to understand
● Easier to defend
14
Information Disclosure
● Decreased chance of data leakage
● Less resources accessible
15
Risks
16
Risk: Software Issues
Software security
● Bugs
● Security vulnerabilities
● Regular updates needed
● Backdoors? Auditing?
17
Risk: Knowledge gap
Quickly evolving
● IT auditor
● Your colleagues
● You...?
18
Risk: "Does not contain"
No full isolation (yet)
● Treat containers as a host
● Know strengths and weaknesses
19
Defenses
20
Docker Website
Start at the download
● HTTPS
● Digital signatures
● Images verified after downloading
21
Docker Containers
● Namespaces and cgroups
● Seccomp
● Capabilities
● Frameworks
22
Namespaces
Isolates parts of the OS
● PID namespaces
● Network namespaces
● User namespaces → Not really!
23
Namespaces
More spaces
● IPC namespaces (process communication)
● UTS namespaces (hostname/NIS)
● Mount namespaces
24
Seccomp
● Secure computing mode
● Filters syscalls with BPF
● Isolation, not virtualization
● Used in software like:
○ Chrome, OpenSSH, vsftpd
○ LXD and Mbox
25
Seccomp
Default list of blocked calls
● kexec_load
● open_by_handle_at
● init_module
● finit_module
● delete_module
26
Control Groups (cgroups)
● Restrict resources
● Prioritize
● Accounting
● Control
27
Capabilities
● Root user → split into roles
● Default list of allowed capabilities
● --cap-add / --cap-drop
● Combine (e.g. add all, drop a few)
28
Capabilities
Examples
● CAP_NET_ADMIN - Configure networking
● CAP_SETPCAP - Process capabilities
● CAP_SYS_MODULE - Insert and remove
kernel modules
29
Frameworks
AppArmor / SELinux
● MAC frameworks
● Help with containment
● Learning them now, will pay off later
30
Audit Subsystem
● Developed by Red Hat
● Files / system calls
● Monitors the (system | file) integrity
31
Auditing
Audit (example)
# Time related calls
-a always,exit -S adjtimex -S settimeofday -S stime -k time-change
-a always,exit -S clock_settime -k time-change
# Hostname and domain
-a always,exit -S sethostname -S setdomainname -k system-locale
# Password files
-w /etc/group -p wa -k identity
-w /etc/passwd -p wa -k identity
-w /etc/shadow -p wa -k identity
-w /etc/sudoers -p wa -k identity
32
Best Practices
33
Docker Host Hardening 1/2
● Security = Defense in Depth
● Use AppArmor / SELinux / GRSEC
● Limit
○ users / services / network
34
Docker Host Hardening 2/2
● Update your kernel on a regular basis
● Stay up-to-date with Docker
● Limit Docker permissions
35
Containers
Harden your Containers
● Use AppArmor / SELinux
● Drop capabilities (man capabilities)
● Filter syscalls (seccomp)
● Network filtering (iptables)
36
Read-Only Containers
Least amount of privileges
● Docker 1.5
● --read-only
● Restrict writing to volumes
37
Logging
Don't let containers be a black box
● Docker 1.6
● --log-driver
○ none
○ syslog
○ json-file
38
Limit Resources
Ulimit
● Default too high
● Set new container default
○ Docker 1.6
○ --default-ulimit
● On run: --ulimit
39
Docker Management
"Invisibilize"
● Encrypt connections
● Configure and use TLS, set variables:
○ DOCKER_HOST
○ DOCKER_TLS_VERIFY
40
Docker Management
SSH in containers
● Don't use this..
● Use “docker exec -it mycontainer bash”
41
Read-Only
● Mounts
● Data
● Configuration
● Use --read-only
42
Using Mappings
● Map users to non-privileged
○ /etc/subuid
○ /etc/subgid
43
Trust
Or Don't...
● Verify downloads
● Be careful with images from others
● Measure, monitor, audit
44
Auditing
Tools
● Lynis
● OpenSCAP
45
Docker News
Things go quick with Docker
● Stay informed
● Follow the Docker blog
● Keep an eye on Docker (/LXC/LXD) news
46
Questions?
47
More Docker Security
● Blog: linux-audit.com
● Twitter: @mboelen
48
1 von 48

Recomendados

Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13 von
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13Zach Hill
858 views18 Folien
DockerCon SF 2015: Docker Security von
DockerCon SF 2015: Docker SecurityDockerCon SF 2015: Docker Security
DockerCon SF 2015: Docker SecurityDocker, Inc.
7.1K views22 Folien
Security of Linux containers in the cloud von
Security of Linux containers in the cloudSecurity of Linux containers in the cloud
Security of Linux containers in the cloudDobrica Pavlinušić
4.6K views20 Folien
Practical Approaches to Container Security von
Practical Approaches to Container SecurityPractical Approaches to Container Security
Practical Approaches to Container SecurityShea Stewart
524 views12 Folien
Ten layers of container security for CloudCamp Nov 2017 von
Ten layers of container security  for CloudCamp Nov 2017Ten layers of container security  for CloudCamp Nov 2017
Ten layers of container security for CloudCamp Nov 2017Gordon Haff
254 views25 Folien
Veer's Container Security von
Veer's Container SecurityVeer's Container Security
Veer's Container SecurityJim Barlow
1K views49 Folien

Más contenido relacionado

Was ist angesagt?

Docker Security - Continuous Container Security von
Docker Security - Continuous Container SecurityDocker Security - Continuous Container Security
Docker Security - Continuous Container SecurityDieter Reuter
3.8K views14 Folien
Docker and kernel security von
Docker and kernel securityDocker and kernel security
Docker and kernel securitysmart_bit
1.2K views30 Folien
Container Security von
Container SecurityContainer Security
Container SecuritySalman Baset
470 views25 Folien
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti... von
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...Docker, Inc.
7.4K views35 Folien
5 Ways to Secure Your Containers for Docker and Beyond von
5 Ways to Secure Your Containers for Docker and Beyond5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and BeyondBlack Duck by Synopsys
1.2K views34 Folien
Docker London: Container Security von
Docker London: Container SecurityDocker London: Container Security
Docker London: Container SecurityPhil Estes
16.9K views21 Folien

Was ist angesagt?(20)

Docker Security - Continuous Container Security von Dieter Reuter
Docker Security - Continuous Container SecurityDocker Security - Continuous Container Security
Docker Security - Continuous Container Security
Dieter Reuter3.8K views
Docker and kernel security von smart_bit
Docker and kernel securityDocker and kernel security
Docker and kernel security
smart_bit1.2K views
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti... von Docker, Inc.
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
Docker, Inc.7.4K views
Docker London: Container Security von Phil Estes
Docker London: Container SecurityDocker London: Container Security
Docker London: Container Security
Phil Estes16.9K views
Docker Security and Content Trust von ehazlett
Docker Security and Content TrustDocker Security and Content Trust
Docker Security and Content Trust
ehazlett621 views
All Things Open 2017: How to Treat a Network as a Container von Rosemary Wang
All Things Open 2017: How to Treat a Network as a ContainerAll Things Open 2017: How to Treat a Network as a Container
All Things Open 2017: How to Treat a Network as a Container
Rosemary Wang507 views
Troubleshooting Tips from a Docker Support Engineer von Jeff Anderson
Troubleshooting Tips from a Docker Support EngineerTroubleshooting Tips from a Docker Support Engineer
Troubleshooting Tips from a Docker Support Engineer
Jeff Anderson1.1K views
Justin Cormack - The 10 Container Security Tricks That Will Help You Sleep At... von Codemotion
Justin Cormack - The 10 Container Security Tricks That Will Help You Sleep At...Justin Cormack - The 10 Container Security Tricks That Will Help You Sleep At...
Justin Cormack - The 10 Container Security Tricks That Will Help You Sleep At...
Codemotion528 views
Container Security von Jie Liau
Container SecurityContainer Security
Container Security
Jie Liau577 views
Secure Substrate: Least Privilege Container Deployment von Docker, Inc.
Secure Substrate: Least Privilege Container Deployment Secure Substrate: Least Privilege Container Deployment
Secure Substrate: Least Privilege Container Deployment
Docker, Inc.11.6K views
Container Security Deep Dive & Kubernetes von Aqua Security
Container Security Deep Dive & Kubernetes Container Security Deep Dive & Kubernetes
Container Security Deep Dive & Kubernetes
Aqua Security2.6K views
OpenShift & SELinux with Dan Walsh @rhatdan von OpenShift Origin
OpenShift & SELinux with Dan Walsh @rhatdanOpenShift & SELinux with Dan Walsh @rhatdan
OpenShift & SELinux with Dan Walsh @rhatdan
OpenShift Origin3.5K views
Docker Container Security - A Network View von NeuVector
Docker Container Security - A Network ViewDocker Container Security - A Network View
Docker Container Security - A Network View
NeuVector2.1K views
Ryan Koop's Docker Chicago Meetup Demo March 12 2014 von Cohesive Networks
Ryan Koop's Docker Chicago Meetup Demo March 12 2014Ryan Koop's Docker Chicago Meetup Demo March 12 2014
Ryan Koop's Docker Chicago Meetup Demo March 12 2014
Cohesive Networks451 views
Securing Applications and Pipelines on a Container Platform von All Things Open
Securing Applications and Pipelines on a Container PlatformSecuring Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container Platform
All Things Open929 views
Integrating Linux Systems with Active Directory Using Open Source Tools von All Things Open
Integrating Linux Systems with Active Directory Using Open Source ToolsIntegrating Linux Systems with Active Directory Using Open Source Tools
Integrating Linux Systems with Active Directory Using Open Source Tools
All Things Open2.9K views

Similar a Docker Security - Secure Container Deployment on Linux

Docker Security: Are Your Containers Tightly Secured to the Ship? von
Docker Security: Are Your Containers Tightly Secured to the Ship?Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?Michael Boelen
8.7K views44 Folien
Testing Docker Security Linuxlab 2017 von
Testing Docker Security Linuxlab 2017Testing Docker Security Linuxlab 2017
Testing Docker Security Linuxlab 2017Jose Manuel Ortega Candel
444 views59 Folien
Everything you need to know about containers security von
Everything you need to know about containers securityEverything you need to know about containers security
Everything you need to know about containers securityJose Manuel Ortega Candel
428 views57 Folien
The internals and the latest trends of container runtimes von
The internals and the latest trends of container runtimesThe internals and the latest trends of container runtimes
The internals and the latest trends of container runtimesAkihiro Suda
88 views72 Folien
A Gentle Introduction To Docker And All Things Containers von
A Gentle Introduction To Docker And All Things ContainersA Gentle Introduction To Docker And All Things Containers
A Gentle Introduction To Docker And All Things ContainersJérôme Petazzoni
60.6K views52 Folien
Introduction to Docker and all things containers, Docker Meetup at RelateIQ von
Introduction to Docker and all things containers, Docker Meetup at RelateIQIntroduction to Docker and all things containers, Docker Meetup at RelateIQ
Introduction to Docker and all things containers, Docker Meetup at RelateIQdotCloud
2.2K views52 Folien

Similar a Docker Security - Secure Container Deployment on Linux(20)

Docker Security: Are Your Containers Tightly Secured to the Ship? von Michael Boelen
Docker Security: Are Your Containers Tightly Secured to the Ship?Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?
Michael Boelen8.7K views
The internals and the latest trends of container runtimes von Akihiro Suda
The internals and the latest trends of container runtimesThe internals and the latest trends of container runtimes
The internals and the latest trends of container runtimes
Akihiro Suda88 views
A Gentle Introduction To Docker And All Things Containers von Jérôme Petazzoni
A Gentle Introduction To Docker And All Things ContainersA Gentle Introduction To Docker And All Things Containers
A Gentle Introduction To Docker And All Things Containers
Jérôme Petazzoni60.6K views
Introduction to Docker and all things containers, Docker Meetup at RelateIQ von dotCloud
Introduction to Docker and all things containers, Docker Meetup at RelateIQIntroduction to Docker and all things containers, Docker Meetup at RelateIQ
Introduction to Docker and all things containers, Docker Meetup at RelateIQ
dotCloud2.2K views
Swarm: Native Docker Clustering von Royee Tager
Swarm: Native Docker ClusteringSwarm: Native Docker Clustering
Swarm: Native Docker Clustering
Royee Tager1.1K views
Unraveling Docker Security: Lessons From a Production Cloud von Salman Baset
Unraveling Docker Security: Lessons From a Production CloudUnraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production Cloud
Salman Baset457 views
Tokyo OpenStack Summit 2015: Unraveling Docker Security von Phil Estes
Tokyo OpenStack Summit 2015: Unraveling Docker SecurityTokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker Security
Phil Estes1.6K views
How Secure Is Your Container? ContainerCon Berlin 2016 von Phil Estes
How Secure Is Your Container? ContainerCon Berlin 2016How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016
Phil Estes5.6K views
CS 626 - March : Capsicum: Practical Capabilities for UNIX von ruchith
CS 626 - March : Capsicum: Practical Capabilities for UNIXCS 626 - March : Capsicum: Practical Capabilities for UNIX
CS 626 - March : Capsicum: Practical Capabilities for UNIX
ruchith375 views
Navigating container technology for enhanced security by Niklas Saari von Metosin Oy
Navigating container technology for enhanced security by Niklas SaariNavigating container technology for enhanced security by Niklas Saari
Navigating container technology for enhanced security by Niklas Saari
Metosin Oy14 views
Securing Applications and Pipelines on a Container Platform von All Things Open
Securing Applications and Pipelines on a Container PlatformSecuring Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container Platform
All Things Open182 views
The Future of Security and Productivity in Our Newly Remote World von DevOps.com
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote World
DevOps.com208 views
Introduction to containers von Nitish Jadia
Introduction to containersIntroduction to containers
Introduction to containers
Nitish Jadia122 views
ATT&CKING Containers in The Cloud von MITRE ATT&CK
ATT&CKING Containers in The CloudATT&CKING Containers in The Cloud
ATT&CKING Containers in The Cloud
MITRE ATT&CK650 views

Más de Michael Boelen

Lets make better scripts von
Lets make better scriptsLets make better scripts
Lets make better scriptsMichael Boelen
125 views91 Folien
Getting Traction for (your) Open Source Projects von
Getting Traction for (your) Open Source ProjectsGetting Traction for (your) Open Source Projects
Getting Traction for (your) Open Source ProjectsMichael Boelen
420 views49 Folien
Linux Security Scanning with Lynis von
Linux Security Scanning with LynisLinux Security Scanning with Lynis
Linux Security Scanning with LynisMichael Boelen
1.2K views52 Folien
Dealing with Linux Malware von
Dealing with Linux MalwareDealing with Linux Malware
Dealing with Linux MalwareMichael Boelen
1.8K views35 Folien
Linux Hardening von
Linux HardeningLinux Hardening
Linux HardeningMichael Boelen
2.4K views60 Folien
Handling of compromised Linux systems von
Handling of compromised Linux systemsHandling of compromised Linux systems
Handling of compromised Linux systemsMichael Boelen
3.3K views40 Folien

Más de Michael Boelen(11)

Getting Traction for (your) Open Source Projects von Michael Boelen
Getting Traction for (your) Open Source ProjectsGetting Traction for (your) Open Source Projects
Getting Traction for (your) Open Source Projects
Michael Boelen420 views
Linux Security Scanning with Lynis von Michael Boelen
Linux Security Scanning with LynisLinux Security Scanning with Lynis
Linux Security Scanning with Lynis
Michael Boelen1.2K views
Handling of compromised Linux systems von Michael Boelen
Handling of compromised Linux systemsHandling of compromised Linux systems
Handling of compromised Linux systems
Michael Boelen3.3K views
Linux Security, from Concept to Tooling von Michael Boelen
Linux Security, from Concept to ToolingLinux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
Michael Boelen1.9K views
Linux Security for Developers von Michael Boelen
Linux Security for DevelopersLinux Security for Developers
Linux Security for Developers
Michael Boelen3.4K views
Commercieel gaan met je open source project von Michael Boelen
Commercieel gaan met je open source projectCommercieel gaan met je open source project
Commercieel gaan met je open source project
Michael Boelen474 views
How Many Linux Security Layers Are Enough? von Michael Boelen
How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
Michael Boelen6.7K views
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014 von Michael Boelen
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Lynis - Hardening and auditing for Linux, Mac and Unix - NLUUG May 2014
Michael Boelen3K views

Último

What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
131 views23 Folien
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... von
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...ShapeBlue
48 views17 Folien
"Surviving highload with Node.js", Andrii Shumada von
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada Fwdays
40 views29 Folien
Why and How CloudStack at weSystems - Stephan Bienek - weSystems von
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsShapeBlue
111 views13 Folien
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... von
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Moses Kemibaro
29 views38 Folien
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates von
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesShapeBlue
119 views15 Folien

Último(20)

What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue131 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... von ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue48 views
"Surviving highload with Node.js", Andrii Shumada von Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays40 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems von ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue111 views
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... von Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro29 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates von ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue119 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online von ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue102 views
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue von ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue96 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... von James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson133 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... von ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue83 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT von ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue91 views
Business Analyst Series 2023 - Week 3 Session 5 von DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10369 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue von ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue46 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 von Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi141 views

Docker Security - Secure Container Deployment on Linux