Office Hours Sign Up Page

Office Hours

Automating Secure Configuration for OpenShift Workloads

Date: Thursday, June 17, 2021
Time: 1:00 pm PDT | 4:00 pm EDT

Red Hat OpenShift uses a declarative model for configuring workloads and comes with specific controllers to ensure the observed state adheres to the desired workload configurations.

Securely configuring workloads is one of the key elements of protecting containerized applications in OpenShift. Customers can leverage built-in controls in the OpenShift platform to provide developers and security teams with security guardrails. When there is a configuration drift, these controls can be used to ensure prompt remediation.

Learn how to go beyond image scanning and extend security to the deploy phase of OpenShift applications where workloads are configured.

We will show you how to:

  • use access and authorization controls to protect your OpenShift clusters from unauthorized access
  • reduce your attack surface and mitigate lateral movement by implementing workload isolation using network policies
  • embed configuration checks into the build pipeline to shift security left
  • take advantage of Kubernetes-native controls for better policy enforcement

Join us to see a live demo of how to leverage the built-in OpenShift capabilities and Red Hat Advanced Cluster Security for Kubernetes to build and deploy a more secure application.

StackRox is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. You may unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.

By submitting this form, you consent to allow StackRox to store and process the personal information submitted above in order to provide you the content or service requested.

Presented by

Neil Carpenter Senior Principal Specialist Solutions Architect, Red Hat

Chris Porter Director - Solutions Architecture, Red Hat