Patching In a virtualized environment or traditional AWS, security patches are installed independently of the application code. The process can be automated patch partially with configuration management tools, so if you're running VMs in AWS or elsewhere, you can update or Chef clearly confused mode and "force" that configuration for all your cases from one center. an image Docker has two components: the basic images and application images. To patch a container system, you must update the basic image and then reconstruct the image application. Therefore, in case of a flaw as Heartbleed, if you want to ensure that the new version of SSL is on each container, you will update the basic image and recreate the containers in accordance with the procedure your typical deployment. A process automation deploy complex (which is likely already in place if you are a container) will do this is quite simple. One of the most promising features of Docker is the extent to which dependent applications associated with the application itself, the product has the potential to fix the system when the application is updated, ie, frequent and potentially less painful. But somewhat counterintuitively, Docker also provides a bright line between the system and the development team: the team's support system infrastructure, compute clusters, and virtual patching cases; development team to support the container. If you're trying to get to a place where the system development and your teams work closely with each other and clear responsibility, this is an attractive feature. If you are using a vendor management services (such as Logicworks), there is a clear delineation between the group responsible for internal and external. The main takeaway: To make a patch, update the image basic and then rebuild the application image. This requires systems and development teams to work closely together, and clear accountability. Almost ready for prime time If you are eager to implement Docker and ready to have some certain amount of risk, then the method described here can help you monitor and fix the system container. At Logicworks, this is how we manage container systems for business customers every day. As AWS and Azure continued to develop their container support and software providers in the space more independent, forward Docker forward the security measures "classics" to change rapidly. Nine months from now, or even three months from now, a development tool that can automate many of what are the trademarks or complex security Docker. As this is now delighted about a new technology, it can be a whole new industry will follow.
đang được dịch, vui lòng đợi..
