Security Focused Learning Session

Implementing multi-layer container and
Kubernetes security for DevSecOps Workshop

October 21, 202111:00 AM - 1:30 PM(GMT-04:00) Eastern Time (US & Canada)

Tackling the security of containers and Kubernetes involves more than just the application layer. Security should be implemented at each level of the stack—the underlying host, container, orchestration, and application layers.

In this workshop, we will cover the comprehensive container and Kubernetes security capabilities available in Red Hat® OpenShift® and Red Hat Advanced Cluster Security (from StackRox acquisition).

You will gain experience with:

  • Host OS (Red Hat CoreOS and Red Hat Enterprise Linux®) security technologies.
  • Evaluating container content and sources for vulnerabilities.
  • Designing the build and CI/CD pipeline to proactively check container content and ensure content governance across the application life cycle, including image policy management and enforcement, image scanning, and image signing.
  • Certificate & secrets management.
  • Implementing methods to control access to containers via authentication and authorization.
  • Red Hat OpenShift Container Platform security technologies, including Security Context Constraints (SCC), role-based access control (RBAC), and network security with network policies
  • Logging, monitoring, and auditing.

To get the most out of this workshop, participants should have a developer or linux system administrator background, and be familiar with the following:

  • Linux command line and OpenShift® command line
  • Entry level Linux container concepts
  • Entry level Kubernetes concepts

Virtual workshop details

Time: 11:00 a.m. - 1:30 p.m. EDT

Date: October 21, 2021

Speakers: Lucy Kerner, Khary Mendez, Justin Goldsmith, Neil Carpenter, Roberto Carratala, Joshua Smith, Laine Minor, Jamie Scott, and Shanna Chan

Virtual workshop login details will be communicated to registrants via email and closer to the date of the event.

Any questions? Please email infrastructure@redhat.com

Agenda instruction text goes here
SESSION TIME
REGISTRATION & BREAKFAST 7:30 AM – 8:30 AM
WELCOME
lorem ipsum
8:30 AM – 8:45 AM
KEYNOTE: lorem ipsum
lorem ipsum
 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero.

8:45 AM – 9:15 AM
BREAK
NETWORKING
9:15 AM – 9:30 AM
Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero.

9:30 AM – 10:30 AM
BREAK
NETWORKING & SNACKS
10:30 AM – 10:45 AM
Lorem Ipsum 2

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero.

10:45 AM – 11:45 AM
BREAK
NETWORKING
11:45 AM – 12:00 PM
Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse porta, nibh nec fringilla dignissim, purus ex tempus ex, eu elementum nisl massa imperdiet risus. Etiam nec orci placerat, tempor dolor eu, viverra libero.

12:00 PM – 12:45 PM
CLOSING REMARKS
John Doe, Partner-In-Charge of Nonprofit
12:45 PM – 12:55 PM
LUNCH & NETWORKING 12:55 PM – 2:00 PM

Location
BlueJeans
Bluejeans
Bluejeans, North Carolina  Bluejeans


Time: X:XX a.m. - X:XX p.m.

Speakers

Hear from our experts

Sponsors

Cras sed luctus libero. Donec id orci quis justo tincidunt placerat.

Gold

Silver