From the course: Container Security by InfoSec
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Baseline and anomaly detection
From the course: Container Security by InfoSec
Baseline and anomaly detection
- [Instructor] Hello and welcome back to the container security learning path. We're in the Docker security section, and in this area of the Docker security course, we're going to talk about baselines and anomaly detection. It's a section 15, the second course in the container security learning path. Let's get rolling. So container baselines, right? This is not baseball baselines, but this is defining some sort of representation of the normal behavior of a container, right? And once you understand what is normal, you can actually detect those anomalies, right? If you can't, if you have no clue what normal is, it's very hard to (chuckles) catch or determine what abnormal, anomalous behavior is, right? So in other, excuse me, in order to understand what's normal, right, you have to have some sort of effective monitoring in place, right? So you understand that. And track the behavior of a container. And then once you have that behavior sort of understood, you can map that to a policy…
Contents
-
-
-
-
(Locked)
Container image misconfigurations19m 42s
-
(Locked)
Running dockers and persisting data27m 21s
-
(Locked)
Dockerfile best practices35m 30s
-
(Locked)
Namespaces and Cgroups16m 3s
-
(Locked)
Seccomp and capabilities20m 5s
-
(Locked)
Docker networking14m 30s
-
(Locked)
Inside the container22m 30s
-
(Locked)
Outside the container23m 32s
-
(Locked)
Reproducible builds15m 38s
-
(Locked)
Public vs internal image repositories12m 26s
-
(Locked)
Hardening the build infrastructure13m 34s
-
(Locked)
Iron vs VM vs cloud providers19m 35s
-
(Locked)
Immutable containers17m 40s
-
(Locked)
Live scanning11m 23s
-
(Locked)
Baseline and anomaly detection16m 8s
-
(Locked)
-
-