Key steps highlighted in this guide include:
- How to start with a minimal installation of the OS and how to selectively add the services needed to run the container applications
- How to configure the host security settings to harden and protect it from unauthorized access
- How to configure and install a Docker Engine with sensible default settings to minimize the attack surface
- How to ensure that the host has the necessary integration with existing enterprise systems like SIEM and enterprise directories
This complementary eBook is offered by Twistlock.