Submit your Linux news story here.

How to take control of your Linux Containers

CoreOS is a free and open-source Linux operating system mainly used in cloud computing. It can run many apps with minimal operational overhead in Google cloud or your private cloud.

From the blog post:

If you have ever heard someone from CoreOS speak on stage, you’ve probably heard them say something similar to, “Our plan is to dramatically improve the security of the internet.” That is the mission our founders set for the company when starting CoreOS.

Security is one of the primary drivers of what we do at CoreOS. Naturally, we’re elated whenever folks come together to celebrate security, like at the RSA Security Conference in San Francisco last week. Our own Brian “Redbeard” joined Google Cloud Platform for their Security event and had a lively conversation on a panel about containers and security.

In the spirit of encouraging best practices in security, we asked the CoreOS team to share their favorite advice about container security.

If you could tell the average developer one thing about container security, what would it be?

Our dev’s answers boil down to this idea:

Take control of your containers.

Whether you’re building your own containers to creating an auditable trail from repo to deployment, being aware of exactly what goes into your containers will insure your stack is as secure as possible. Read on to learn about four tips and perspectives from our team.