youtube image
From YouTube: Automating Secure Configuration for OpenShift

Description

Red Hat OpenShift uses a declarative model for configuring workloads and comes with specific controllers to ensure the observed state adheres to the desired workload configurations.

Securely configuring workloads is one of the key elements of protecting containerized applications in OpenShift. Customers can leverage built-in controls in the OpenShift platform to provide developers and security teams with security guardrails. When there is a configuration drift, these controls can be used to ensure prompt remediation.

Learn how to go beyond image scanning and extend security to the deploy phase of OpenShift applications where workloads are configured. We will show you how to:

- use access and authorization controls to protect your OpenShift clusters from unauthorized access
- reduce your attack surface and mitigate lateral movement by implementing workload isolation using network policies
- embed configuration checks into the build pipeline to shift security left
take advantage of Kubernetes-native controls for better policy enforcement

Join us to see a demo of how to leverage the built-in OpenShift capabilities and Red Hat Advanced Cluster Security for Kubernetes to build and deploy a more secure application.