Shift in the Open With Containers
- FeatureHow to move legacy applications to containers and Kubernetes
- FeatureUnderstanding and managing data protection for Kubernetes
- FeatureA layered approach to container and Kubernetes security
- FeatureSimplify Kubernetes with Red Hat OpenShift Service on AWS
- FeatureTransform your organization with containers
iSTOCK/GETTY IMAGES
A layered approach to container and Kubernetes security
Find out what you need to know about implementing a layered approach to container and Kubernetes security. Download the details today.
Containers have garnered broad appeal through their ability to package an application and its dependencies into a single image that can be promoted from development, to test, and to production. Containers make it easy to ensure consistency across environments and across multiple deployment targets like physical servers, virtual machines (VMs), and private or public clouds. With containers, teams can more easily develop and manage the applications that deliver business agility.
When managing container deployment at scale, you need to consider:
- Which containers should be deployed to which hosts?
- Which host has more capacity?
- Which containers need access to each other and how will they discover each other?
- How do you control access to and management of shared resources such as network and storage?
- How do you monitor container health?
- How do you automatically scale application capacity to meet demand?
- How do you enable developer self-service while also meeting security requirements?
Building security into your applications is critical for cloud-native deployments. Securing your containerized applications requires that you:
- Use trusted container content.
- Use an enterprise container registry.
- Control and automate building containers.
- Integrate security into the application pipeline.
Effective security of your deployment includes securing the Kubernetes platform as well as automating deployment policies. Red Hat OpenShift includes the following capabilities out of the box:
- Platform configuration and life cycle management.
- Identity and access management.
- Securing platform data and attached storage.
- Automate policy-based deployment
Beyond infrastructure, maintaining application security is critical. Securing your containerized applications requires:
- Container isolation.
- Application and network isolation.
- Securing application access.
- Observability
Deploying container-based applications and microservices is not just about security. Your container platform needs to provide an experience that works for your developers and your operations team. You need a security-focused, enterprise-grade, container-based application platform that empowers developers and operators without compromising the functions needed by each team, while also improving operational efficiency and infrastructure utilization.
Red Hat OpenShift is built on a core of standard and portable Linux containers that deliver built-in security features, including:
- Integrated build and CI/CD tools for secure DevOps practices.
- Hardened, enterprise-ready Kubernetes with built-in platform configuration, compliance, and lifecycle management.
- Strong RBAC with integrations to enterprise authentication systems.
- Options for managing cluster ingress and egress.
- Integrated SDN and service mesh with support for network microsegmentation.
- Support for securing remote storage volumes.
- Red Hat Enterprise Linux CoreOS, optimized for running containers at scale with strong isolation.
- Deployment policies to automate runtime security.
- Integrated monitoring, audit, and logging
Download the details today.
Dig Deeper on Data center ops, monitoring and management
-
Dell-Red Hat tackle DIY OpenShift deployments with appliance
-
Automating modernization: Takeaways from Red Hat Summit 2023
-
Now a DevOps platform, OpenShift ups value -- and complexity
-
Red Hat & Nutanix: a partnership forged in cloud-native leadership