Download Gartner Report: Best Practices for Running Containers and Kubernetes in Production DOWNLOAD NOW
{ .link_text }}

Making Security Easier for OpenShift Customers

Greetings from the Red Hat Summit in Boston! We had a great time at OpenShift Commons yesterday, and today we’re talking to folks about some joint news between StackRox and Red Hat – the StackRox Kubernetes Security Platform is now available as a Red Hat certified container, and customers can get our software through the Red Hat Container Catalog.

This certification makes it easier for OpenShift customers to access enhanced security and compliance capabilities that complement Red Hat’s Kubernetes platform. Customers can easily find the StackRox software on the Red Hat Container Catalog, and certification alleviates any interoperability concerns. Red Hat staff commented:

By certifying its solution with Red Hat, StackRox and its customers using the certified container on Red Hat’s hybrid cloud technologies, including Red Hat OpenShift Container Platform, can deploy cloud-native workloads into production with greater confidence.

StackRox has made a Kubernetes-native architecture the heart of its security platform. Kubernetes – in any of its distributions including OpenShift, Amazon EKS, Azure AKS, Google GKE, and Docker Enterprise Edition – provides many security capabilities but organizations face two main challenges in securing these environments:

  1. the security features are not enabled by default – Kubernetes is first and foremost a developer’s tool, so it defaults to enabling lots of permissions and connectivity. Organizations need to understand how best to enable these protections to make them effective.
  2. additional security capabilities beyond the inherent controls are needed – once companies get Kubernetes set up as securely as possible, there remains critical use cases such as runtime detection that cannot be met by the controls embedded directly in the infrastructure. Organizations need to augment native controls with these runtime detection and response capabilities to ensure full protection.

To make the most of the native Kubernetes controls, check out our guides to Network Policies, Admission Controllers, and Maximizing Kubernetes Security. These tips and tricks apply whether you’re managing Kubernetes yourself or using OpenShift or another managed distribution. We look forward to partnering with the broad Red Hat OpenShift customer community to make Kubernetes more secure.


Categories:Tags: