Secure Engine
This section discusses the security features you can configure and use within your Docker Engine installation.
- You can configure Docker’s trust features so that your users can push and pull trusted images. To learn how to do this, see Use trusted images in this section. 
- You can protect the Docker daemon socket and ensure only trusted Docker client connections. For more information, Protect the Docker daemon socket 
- You can use certificate-based client-server authentication to verify a Docker daemon has the rights to access images on a registry. For more information, see Using certificates for repository client verification. 
- You can configure secure computing mode (Seccomp) policies to secure system calls in a container. For more information, see Seccomp security profiles for Docker. 
- An AppArmor profile for Docker is installed with the official .deb packages. For information about this profile and overriding it, see AppArmor security profiles for Docker. 
seccomp, security, docker, documentation
    © 2019 Docker, Inc.
Licensed under the Apache License, Version 2.0.
Docker and the Docker logo are trademarks or registered trademarks of Docker, Inc. in the United States and/or other countries.
Docker, Inc. and other parties may also have trademark rights in other terms used herein.
    https://docs.docker.com/v18.09/engine/security/