summaryrefslogtreecommitdiff
path: root/docs/sources/articles/security.rst
diff options
context:
space:
mode:
Diffstat (limited to 'docs/sources/articles/security.rst')
-rw-r--r--docs/sources/articles/security.rst6
1 files changed, 4 insertions, 2 deletions
diff --git a/docs/sources/articles/security.rst b/docs/sources/articles/security.rst
index 3dc5780e85..ec2ab9bffd 100644
--- a/docs/sources/articles/security.rst
+++ b/docs/sources/articles/security.rst
@@ -7,7 +7,7 @@
Docker Security
===============
- *Adapted from* `Containers & Docker: How Secure are They? <blogsecurity>`_
+ *Adapted from* `Containers & Docker: How Secure are They? <blogsecurity_>`_
There are three major areas to consider when reviewing Docker security:
@@ -82,6 +82,8 @@ when some applications start to misbehave.
Control Groups have been around for a while as well: the code was
started in 2006, and initially merged in kernel 2.6.24.
+.. _dockersecurity_daemon:
+
Docker Daemon Attack Surface
----------------------------
@@ -261,7 +263,7 @@ with Docker, since everything is provided by the kernel anyway.
For more context and especially for comparisons with VMs and other
container systems, please also see the `original blog post
-<blogsecurity>`_.
+<blogsecurity_>`_.
.. _blogsecurity: http://blog.docker.io/2013/08/containers-docker-how-secure-are-they/