How to Securely Configure a Linux Host
How to start with a minimal installation of the OS and how to selectively add the services needed to run the container applications
How to configure the host security settings to harden and protect it from unauthorized access
How to configure and install a Docker Engine with sensible default settings to minimize the attack surface
How to ensure that the host has the necessary integration with existing enterprise systems like SIEM and enterprise directories