Best practices for securing the container life cycle

IT organizations are using container technology and DevOps processes to bring new-found agility to delivering applications that create business value. However, enterprise use requires strong security at every stage of the life cycle. Nothing is secure by default—security takes work. You need defense in depth. Red Hat delivers multiple layers of security controls throughout your Read more about Best practices for securing the container life cycle[…]

OpenShift Seccomp – Securing Containers by Stripping Capabilities

Let say you want to prove to your security team that running a pod in Red Hat OpenShift is really removing capabilities from the running container.  There is not much documentation out there which explains how to find what capabilities get stripped so I will walk you through how you can make the case. Step Read more about OpenShift Seccomp – Securing Containers by Stripping Capabilities[…]


Hit Counter provided by laptop reviews