From the course: Docker: Continuous Delivery
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Security concerns - Docker Tutorial
From the course: Docker: Continuous Delivery
Security concerns
- [Instructor] I've been playing it fast and loose with security throughout this course, and while that's fine for creating small examples that are easy to absorb in the context of learning, it is something to be aware of, so I just want to take this opportunity to explicitly call it out. I used HTTP instead of HTTPS, because this is a course on deployment, not a course on HTTPS. I used overly broad AWS permissions to help the demos flow more quickly. And I left my ECS cluster open to the world while I was recording. Security measures should always be taken in proportion to what they're protecting. Though it's really important to pay attention as what they're protecting grows, and when that calculus tips the other way. A few common best practices, don't store credentials in code. This one is so important to me, I didn't even do that in this course, even to shorten the examples. I've been burned. In this course we used instance roles for everything in AWS. We didn't store credentials…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.