Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add doc structure #43

Merged
merged 1 commit into from
May 25, 2021
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 9 additions & 1 deletion 000 - Introduction.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ Looking at it from the perspective of the classical world, especially in system

Apart from these technical areas there are two non-technical points:

* Docker with its 5 years is a relatively new technology. Subtracting the time for maturing and adoption the time span is even shorter. Every new technology needs time until the knowledge of the technology and their best practices becomes common knowledge.
* Docker is not a new technology anymore but subtracting the time for maturing and adoption, its time span is shorter. Every technology needs time until the knowledge of the technology and their best practices becomes common knowledge.
* While container solutions might offer benefits for the developer, the technology is not simple from the security perspective. Not being simple is what makes security more difficult, a.k.a. the _KISS principle_ -- keep it simple and stupid.

This is what this document is trying to help you with: It provides you with the knowledge to avoid common pitfalls in the system and network area and it tries to get a handle on the complexity.
Expand All @@ -31,4 +31,12 @@ This is what this document is trying to help you with: It provides you with the

In order to achieve this, this document first does an analysis of the threats caused by the technology. This is the basis for the ten points to follow.

Each of those ten points has paragraphs in the following order:

* introduction,
* outline of threat scenarios,
* recommendation how to prevent the aforementioned threats,
* technical hint how to identify whether you might a problem here
* and eventually lists references (split in commercial and non-commercial ones)

It is mostly agnostic to any orchestration framework or any other specific product (OS, programming language).