Security for virtual machines has some well established protocols. But as containers continue to infiltrate the data center, what are the best security practices? Docker released a behemoth security documents, but at over 200 pages, not a lot of IT professionals have the time to ingest it in a timely fashion. Luckily, James Green wrote up a little walkthrough on how to run their “Docker Bench of Security” tool. This reviews your Docker configuration for common security holes, and is a must for any Docker deployments. James breaks down how to install, run, and interpret the tool and its findings.