Building Containerisation Security Practices

Robert di Schiavi

Cyber Security Engineering Lead at N Brown Group plc

Learning Objectives

Key Takeaways:



  • Deployment requirements (images)

  • Danger close: the relationship between the host and the container

  • Assess communication requirements between containers

  • CAP ADD, CAPP DOP function and privileged flag

  • Secure by Design