Tackling the security of containers and Kubernetes involves more than just the application layer. Security should be implemented at each level of the stack—the underlying host, container, orchestration, and application layers. In this workshop, we will cover the comprehensive container and Kubernetes security capabilities available in Red Hat OpenShift and Red Hat Advanced Cluster Security (from StackRox acquisition).
You will gain experience with:
Important Notice | |
|
|
DevSecOps Intro |
Lab Info and walkthrough |
Lab 1 - 3 Lab 1: OpenShift blocks rogue containers from running as privileged user Lab 2: Implementing network isolation between running containers using Network Policies Lab 3: OpenShift Role Based Access Control |
Break |
Lab 4 - 5 Lab 4: Implementing DevSecOps to Build and Automate Security into the Application using Red Hat Advanced Cluster Security Lab 5: Image Signing using Image Signing Operator |
Q&A |
Closing |