{"id":3460,"date":"2019-03-12T11:49:16","date_gmt":"2019-03-12T11:49:16","guid":{"rendered":"http:\/\/10.24.225.70\/?p=3460"},"modified":"2019-03-12T11:49:16","modified_gmt":"2019-03-12T11:49:16","slug":"drowning-in-pci-dss-or-docking-your-app","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/drowning-in-pci-dss-or-docking-your-app\/","title":{"rendered":"Drowning in PCI DSS, or docking your app?"},"content":{"rendered":"<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"256\" height=\"256\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Bestiary_Drowner.webp\" alt=\"\" class=\"wp-image-52011\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Bestiary_Drowner.webp 256w, https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Bestiary_Drowner-150x150.webp 150w, https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Bestiary_Drowner-12x12.webp 12w\" sizes=\"auto, (max-width: 256px) 100vw, 256px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<p><em>Drowner: a frightful creature of mud and scum that drags people down into mires and bubbling eddies. It feeds on young women who bathe in rivers and on occasion will pull men off their horses or carts as they cross a bridge or weir. Drowners arise from the bodies of villains who meet their end in running water or in undertows that appear after storms. These watery creatures embody the spirits of those who can\u2019t rest after death and are sometimes born of fetuses aborted by magical means. They are ugly in appearance, skinny, tall and bony. Their bodies are slimy and green, as is their hair. Wherever a drowner steps, pools of their slimy substance form.<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>You have written your app, you are happy about how it works.<\/p>\n\n\n\n<p>You have rewritten those portions of code wrecked by the superficial handling of that global variable, fixed that bad blinded SQL-Injection and the ominous XSS found during the penetration test.<\/p>\n\n\n\n<p>Closed down any useless opening of connections and you start swimming into the sea of compatibility issues of your application.<\/p>\n\n\n\n<p>It works on RedHat, but on Debian it misses a dependency, not to talk about Windows, Cygwin must be installed with all the issues such a dreadful task might entail.<\/p>\n\n\n\n<p>The same pain (or even more) goes for Windows, if you have to move it to a Linux machine.<\/p>\n\n\n\n<p>Unless your application is written in Java, the above is what every developer experiences when it is time to port&nbsp;the application.<\/p>\n\n\n\n<p>Often, Java might be flawed, have some performance issues with its own JVM and who said that everyone must be enslaved by a single coding language?<\/p>\n\n\n\n<p>Once, and if compatibility issues have been resolved, the mess of system administration and process will begin during the journey of PCI DSS.<\/p>\n\n\n\n<p>You might already have become the monster above, drowned into the Chaos embedded inside the IT industry. An overcomplicated ever-changing liquid world.<\/p>\n\n\n\n<p>At such point, you probably want to change your career or swim deep down in ocean of bits, becoming muddy and skinny.<\/p>\n\n\n\n<p>Both might be a bad end, right?<\/p>\n\n\n\n<p>Worry not! Said the wise! Beyond Java, there might be a good savior launching a rope to rescue you.<\/p>\n\n\n\n<p>Such a savior goes under the name of Docker.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>What is the Docker?<\/strong><\/h2>\n\n\n\n<p>In order to understand the concept behind Docker the first thing to get your head around is the distinction between the Linux kernel and user applications. The kernel is the software, which provides applications with access to your computer\u2019s hardware via drivers and APIs. User applications make use of the kernel to run and include all the software you would normally use such as:<\/p>\n\n\n\n<div <ul><li>web servers such as Apache<\/li><li>application servers such as PHP<\/li><li>Database servers such MySQL<\/li><li>shells such as BASH<\/li><li>tools like Git<\/li><li>email services, etc.<\/li><\/ul> <\/div>\n\n\n\n<p>Docker is a tool that wraps up a number of Linux technologies \u2013 most notably cgroups and kernel namespaces \u2013 in order to isolate bundles of user applications all making shared use of the kernel and divide resources as you see fit. The applications run in an object called a container, which is portable and can be lifted and shifted between servers and desktops with ease.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>How does Docker help in terms of PCI-DSS compliance?<\/strong><\/h3>\n\n\n\n<p>Well, imagine that you write your application and secure it the best you and security consultants can.<\/p>\n\n\n\n<p>You then subscribe contacts with a PCI-DSS certified hosting provider. You ship your Docker container to the hosting provider\u2026 et voil\u00e1:<\/p>\n\n\n\n<p>Scope miniaturized.<\/p>\n\n\n\n<p>Less mess for your QSA, less configuration and time for your hosting provider\u2026 Well, guess what? Less cost for you!<\/p>\n\n\n\n<p>Everything shines, but one thing pops in my mind:<\/p>\n\n\n\n<p>If, with Docker, the core concept is to ship my container with my application and its own dedicated instance of MySQL, Apache, PHP and their configurations, how do I comply with:<\/p>\n\n\n\n<p><em>2.2.1 Implement only one primary function per server to prevent functions that require different security levels from co-existing on the same server. (For example, web servers, database servers, and DNS should be implemented on separate servers.)<\/em><\/p>\n\n\n\n<p><em>Note: Where virtualization technologies are in use, implement only one primary function per virtual system component<\/em><\/p>\n\n\n\n<p>With Docker database, web server and application server coexist in the same container and therefore in the same server. Is Docker considered a virtualization technology? Should we put all the primary functions in separate containers? If yes, does it still make sense to use Docker over VMs?<\/p>\n\n\n\n<p>If we answer yes to all the above, the containers are isolated between each others, so hypothetically it would be possible to put a whole payment system inside one single server, with all the primary functions split into many containers sharing the same kernel.<\/p>\n\n\n\n<p>If not, Docker is probably not so helpful in terms of PCI DSS, and barely from a compatibility point of view.<\/p>\n\n\n\n<p>Anyhow, Docker is a technology in its childhood and as Friedrich Nietzsche used to say:<\/p>\n\n\n\n<p>Future influences Present as much as Past does.<\/p>","protected":false},"excerpt":{"rendered":"<p>\t\t\t\t\t\tThe concept behind Docker  starts with understanding the distinction between the Linux kernel and user applications<\/p>","protected":false},"author":2,"featured_media":60231,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":3,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[117,127,128],"class_list":["post-3460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-blog","tag-pci","tag-pci-dss"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Drowning in PCI DSS, or docking your app? - Complior<\/title>\n<meta name=\"description\" content=\"The concept behind Docker starts with understanding the distinction between the Linux kernel and user applications\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/drowning-in-pci-dss-or-docking-your-app\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Drowning in PCI DSS, or docking your app? - Complior\" \/>\n<meta property=\"og:description\" content=\"The concept behind Docker starts with understanding the distinction between the Linux kernel and user applications\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/drowning-in-pci-dss-or-docking-your-app\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-12T11:49:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/drowning-in-pci-dss-or-docking-your-app\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/drowning-in-pci-dss-or-docking-your-app\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"Drowning in PCI DSS, or docking your app?\",\"datePublished\":\"2019-03-12T11:49:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/drowning-in-pci-dss-or-docking-your-app\\\/\"},\"wordCount\":457,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/drowning-in-pci-dss-or-docking-your-app\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Drowning-in-PCI-DSS-or-docking-your-app.webp\",\"keywords\":[\"Blog\",\"PCI\",\"PCI DSS\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/drowning-in-pci-dss-or-docking-your-app\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/drowning-in-pci-dss-or-docking-your-app\\\/\",\"name\":\"Drowning in PCI DSS, or docking your app? - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/drowning-in-pci-dss-or-docking-your-app\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/drowning-in-pci-dss-or-docking-your-app\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Drowning-in-PCI-DSS-or-docking-your-app.webp\",\"datePublished\":\"2019-03-12T11:49:16+00:00\",\"description\":\"The concept behind Docker starts with understanding the distinction between the Linux kernel and user applications\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/drowning-in-pci-dss-or-docking-your-app\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/drowning-in-pci-dss-or-docking-your-app\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/drowning-in-pci-dss-or-docking-your-app\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Drowning-in-PCI-DSS-or-docking-your-app.webp\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Drowning-in-PCI-DSS-or-docking-your-app.webp\",\"width\":1140,\"height\":350,\"caption\":\"3 people close to each other, one is looking at a mobile phone3 people close to each other, one is looking at a mobile phone\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/drowning-in-pci-dss-or-docking-your-app\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Drowning in PCI DSS, or docking your app?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Drowning in PCI DSS, or docking your app? - Complior","description":"The concept behind Docker starts with understanding the distinction between the Linux kernel and user applications","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/drowning-in-pci-dss-or-docking-your-app\/","og_locale":"en_GB","og_type":"article","og_title":"Drowning in PCI DSS, or docking your app? - Complior","og_description":"The concept behind Docker starts with understanding the distinction between the Linux kernel and user applications","og_url":"https:\/\/complior.se\/en\/drowning-in-pci-dss-or-docking-your-app\/","og_site_name":"Complior","article_published_time":"2019-03-12T11:49:16+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app.webp","type":"image\/webp"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/drowning-in-pci-dss-or-docking-your-app\/#article","isPartOf":{"@id":"https:\/\/complior.se\/drowning-in-pci-dss-or-docking-your-app\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"Drowning in PCI DSS, or docking your app?","datePublished":"2019-03-12T11:49:16+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/drowning-in-pci-dss-or-docking-your-app\/"},"wordCount":457,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/drowning-in-pci-dss-or-docking-your-app\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app.webp","keywords":["Blog","PCI","PCI DSS"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/drowning-in-pci-dss-or-docking-your-app\/","url":"https:\/\/complior.se\/drowning-in-pci-dss-or-docking-your-app\/","name":"Drowning in PCI DSS, or docking your app? - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/drowning-in-pci-dss-or-docking-your-app\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/drowning-in-pci-dss-or-docking-your-app\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app.webp","datePublished":"2019-03-12T11:49:16+00:00","description":"The concept behind Docker starts with understanding the distinction between the Linux kernel and user applications","breadcrumb":{"@id":"https:\/\/complior.se\/drowning-in-pci-dss-or-docking-your-app\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/drowning-in-pci-dss-or-docking-your-app\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/drowning-in-pci-dss-or-docking-your-app\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app.webp","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app.webp","width":1140,"height":350,"caption":"3 people close to each other, one is looking at a mobile phone3 people close to each other, one is looking at a mobile phone"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/drowning-in-pci-dss-or-docking-your-app\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"Drowning in PCI DSS, or docking your app?"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app.webp",1140,350,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app-150x150.webp",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app-300x92.webp",300,92,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app-768x236.webp",768,236,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app-1024x314.webp",1024,314,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app.webp",1140,350,false],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app.webp",1140,350,false],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2019\/03\/Drowning-in-PCI-DSS-or-docking-your-app-18x6.webp",18,6,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"The concept behind Docker starts with understanding the distinction between the Linux kernel and user applications","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/3460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=3460"}],"version-history":[{"count":0,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/3460\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/60231"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=3460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=3460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=3460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}