Skip to main content

Security Implementation with Red Hat OpenShift on IBM Power Systems

An IBM Redpaper publication

thumbnail 

Published on 25 April 2023

  1. .EPUB (6.0 MB)
  2. .PDF (27.1 MB)

Share this page:   

ISBN-10: 0738461075
ISBN-13: 9780738461076
IBM Form #: REDP-5690-00


Authors: Dino Quintero, John Adegbile, Faraz Ahmad, Sambasiva Andaluri, Agustin Barreto, Olavo Borges, Ivaylo Bozhinov, Daniel Casali, Gayathri Gopalakrishnan, Nilabja Haldar, Abhishek Jain, Josephine Eskaline Joyce, Youssef Largou, Amrita Maitra, David Pearson, João André Pellizzari, Dennis Riemenschneider and Tim Simon

    menu icon

    Abstract

    Red Hat OpenShift is a powerful and flexible container orchestration platform that enables organizations to build, deploy, and manage applications in a cloud-native environment. As with any production system, you must ensure the security of an Red Hat OpenShift deployment, which includes secure deployment and configuration of the Red Hat OpenShift components, and ongoing maintenance and monitoring to ensure the continued security of the environment.

    This IBM® Redpaper publication provides a comprehensive overview of the security best practices for deploying Red Hat OpenShift on IBM Power. It covers the essential steps to secure your Red Hat OpenShift environment and ensure the confidentiality, integrity, and availability of your data and applications.

    Table of Contents

    Chapter 1. Introduction

    Chapter 2. Building blocks and IBM Power capabilities

    Chapter 3. Security framework and attack vectors

    Chapter 4. Designing and implementing Red Hat OpenShift with security first

    Chapter 5. Authentication and authorization

    Chapter 6. Data and application security

    Chapter 7. Logging and monitoring

    Chapter 8. Compliance and regulation

    Chapter 9. Security Site Reliability Engineer

    Chapter 10. Aqua

     

    Others who read this also read