Security and Compliance With OpenShift 4
Security and Compliance With OpenShift 4
DevOps
Distributed Systems
Automation
Cloud-Native
GitOps
Artificial Intelligence
Digital Transformation
OpenShift
Se curit y Compliance
Survey 1
Thinking back to the last project that you worked on, at what point was security
addressed?
a) At the beginning
b) In the middle
c) Towards the end
d) Never
e) Throughout, from beginning to end
Cloud Security
Logging
Log aggregation stack, audit logging
A) Yes
B) No
Responsibility
Irresponsibility
Red Hat Universal Base Image (UBI)
https://access.redhat.com/containers
Trusted Container Supply Chain
Application Build Pipeline
Access Control
Subject Object
Role-Based Access Control
Recap
Hybrid Cloud
Security
Compliance
OpenShift 4
RBAC
Next Steps
learn.openshift.com
redhat.com/services
Planning/Discovery Session
developers.redhat.con / CRC
Thank you linkedin.com/company/red -hat