Docker container safety management method, system and equipment and storage medium

A docker container and security management technology, applied in the computer field, can solve the problems of log record preservation, lack of security management process, failure to meet the security management standards of enterprise production servers, etc., and achieve the effect of ensuring security

Inactive Publication Date: 2018-01-26
CTRIP TRAVEL NETWORK TECH SHANGHAI0
View PDF10 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the access to the container adopts the way that the client directly connects to the container. However, because the container cannot save the log record of the execution operation, the operation and maintenance personnel's record of the container execution operation will be destroyed with the release of the container, resulting in the security management process. There are serious deficiencies in the system, which cannot meet the safety management standards of enterprise production servers, and cannot pass the qualification review of level protection, PCI, ISO27001 and other standards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Docker container safety management method, system and equipment and storage medium
  • Docker container safety management method, system and equipment and storage medium
  • Docker container safety management method, system and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.

[0028] Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus repeated descriptions thereof will be omitted. Some of the block diagrams shown in the drawings are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a Docker container safety management method. The Docker container safety management method comprises the following steps: an SSHD (Solid State Hybrid Drive) service is installedin a Docker mirror; a container publishing module transmits container information of a creating container to a server information module; the server information module transmits the container information to an operation-maintenance safety audit module through an API (Application Programmable Interface); an authorization management module acquires operation permission information of the containerset by a user, and transmits the operation permission information to the operation-maintenance safety audit module; and the operation-maintenance safety audit module acquires a container access request of the user, performs login verification according to the operation permission information, is connected with the container through an SSH (Secure Shell) protocol if the verification is passed, so that the user logs in the container through the operation-maintenance safety audit module, and the operation-maintenance safety audit module denies the container access request of the user if the verification fails. Container authorization, safety control of login and operation audit are all finished by the operation-maintenance safety audit module, so that the safety of the container in a using process is ensured fully.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a Docker container security management method, system, equipment and storage medium. Background technique [0002] With the rapid development of Internet information technology, various information systems and network products emerge in an endless stream. Especially in large and medium-sized entities, the rapid construction of IT systems is expanding from traditional closed business systems to large-scale key business systems, and the types of applications involved are also increasing day by day, and the application of Docker containers by large enterprises is also becoming a growing trend. trend. Docker is an open source virtualization technology that aims to provide an automated deployment solution for applications, allowing developers to package their applications and dependencies into a portable container, which can be regarded as a lightweight The virtual machine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F9/455
Inventor 徐楷雷兵凌云余本华江榕
Owner CTRIP TRAVEL NETWORK TECH SHANGHAI0
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products