Deploying Docker Securely
In this post, I will outline steps you can take to securely deploy a docker environment. This assumes you are using Docker daemon on hardware running Linux that you administer. Our main goal is to prevent container escapes and multiple container breaches in the event that a single container is compromised.
Source: Deploying Docker Securely, an article by Charlie Belmer.