0% found this document useful (0 votes)
128 views

Security and Compliance With OpenShift 4

This document discusses approaching security and compliance with OpenShift 4. It introduces concepts like the hybrid cloud, cloud-native development, containers, Kubernetes, and digital transformation. It then covers security topics like data, network, and host security as well as access control and a security mindset of control, defend, and extend. Compliance areas like PII, non-repudiation, and privacy are also introduced. The document outlines OpenShift 4 features that address security and compliance needs like network isolation, logging, identity and access management using RBAC, and the use of immutable CoreOS. It emphasizes that while OpenShift has security built-in, additional steps may still be needed to satisfy an organization's requirements. It promotes the

Uploaded by

Sudeep Batra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
128 views

Security and Compliance With OpenShift 4

This document discusses approaching security and compliance with OpenShift 4. It introduces concepts like the hybrid cloud, cloud-native development, containers, Kubernetes, and digital transformation. It then covers security topics like data, network, and host security as well as access control and a security mindset of control, defend, and extend. Compliance areas like PII, non-repudiation, and privacy are also introduced. The document outlines OpenShift 4 features that address security and compliance needs like network isolation, logging, identity and access management using RBAC, and the use of immutable CoreOS. It emphasizes that while OpenShift has security built-in, additional steps may still be needed to satisfy an organization's requirements. It promotes the

Uploaded by

Sudeep Batra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Approaching

Security and Compliance


with OpenShift 4
Khary Mendez, RHCA Greg Tinsley, RHCA
Principal Consultant Senior Consultant
The Hybrid Cloud
Possibilities
Agile Integration

DevOps
Distributed Systems
Automation
Cloud-Native
GitOps
Artificial Intelligence
Digital Transformation
OpenShift

Cont aine rs Kubernetes


The Application Cloud Orchestrator
The Elephants

Se curit y Compliance
Survey 1
Thinking back to the last project that you worked on, at what point was security
addressed?

a) At the beginning
b) In the middle
c) Towards the end
d) Never
e) Throughout, from beginning to end
Cloud Security

Dat a Ne t work Host s Acce ss


Security Mindset

Cont rol De fe nd Ext e nd


Compliance

PII Non-re pudiation Privacy


Container Revisited
OpenShift 4

Ne t work Isolat ion


Network policy plugin, ISTIO service mesh

Logging
Log aggregation stack, audit logging

Red Hat CoreOS


Immutable operating system

Identity and Access Management


Role Based Access Control, Single Sign
- On
Survey 2
Since OpenShift has security built into the product, is there anything else that needs to be
done to satisfy an organization’s Security and Compliance requirements?

A) Yes
B) No
Responsibility
Irresponsibility
Red Hat Universal Base Image (UBI)

https://access.redhat.com/containers
Trusted Container Supply Chain
Application Build Pipeline
Access Control

Subject Object
Role-Based Access Control
Recap
Hybrid Cloud

Security

Compliance

OpenShift 4

Trusted Image Supply Chain

RBAC
Next Steps
learn.openshift.com

redhat.com/services

github.com/operator -framework/operator -sdk

Planning/Discovery Session

developers.redhat.con / CRC
Thank you linkedin.com/company/red -hat

youtube.com/ user/ RedHatVideos


Red Hat is the world’s leading provider of

enterprise open source software solutions. facebook.com/ redhatinc

Award-winning support, training, and consulting

services make twitter.com/ RedHat

Red Hat a trusted adviser to the Fortune 5 0 0 .

You might also like