As the Department of Defense (DoD) seeks to innovate with agility, standardize interoperability across all branches and agencies, and maintain a high security posture, it has a pressing need to move faster while still managing risk. With a comprehensive hybrid cloud approach, Red Hat is the premier open source company to deliver modernization efforts while providing support throughout the transformation process, leveraging a rich partner ecosystem for mission success.
Accelerate STIG compliance with Red Hat OpenShift’s built-in security features: From 40 CAT I items to 7 (Part 1)
October 11, 2023 - Mike Radecker
On Sep 8, 2023 the Defense Information Systems Agency (DISA) published the Red Hat OpenShift Container Platform 4.12 Security Technical Implementation Guide (OpenShift STIG). This three-part blog series begins with an overview of the OpenShift STIG, some of the built-in security features that come with OpenShift, and compares OpenShift with a general Kubernetes implementation…read more
DISA STIG for Red Hat Enterprise Linux 9 is now available
October 11, 2023 - Red Hat
We are pleased to announce that the Defense Information Security Agency (DISA) has released a Security Technical Implementation Guide (STIG) for RHEL 9. It is available for download at the Department of Defense (DoD) Cyber Exchange. This builds on the recently released DISA STIG for Red Hat OpenShift, showing Red Hat’s continued drive to build a greater security posture for U.S. public sector IT across the hybrid cloud…read more
Transforming Defense operations: The impact of Red Hat Ansible Automation Platform within the DoD
October 6, 2023 - Benny Fields III, Holden Fenner
In the rapidly evolving landscape of technology, security and infrastructure management, the Department of Defense (DoD) faces unprecedented challenges. The demands for efficiency, scalability and security are escalating, requiring innovative solutions that can meet these needs without adding complexity to existing systems. Red Hat Ansible Automation Platform can help…read more
Beyond the STIG: Enhancing Kubernetes security with Red Hat Advanced Cluster Security and the Compliance Operator for Red Hat OpenShift
October 5, 2023 - Christopher Grimm
In the dynamic world of container orchestration, Kubernetes has emerged as the de facto standard for managing containerized applications. However, as organizations increasingly rely on Kubernetes to power their applications, the need for robust security solutions becomes paramount. We recognize this necessity and offer a powerful toolset to enhance Kubernetes security: Red Hat Advanced Cluster Security for Kubernetes (RHACS)...read more
DISA STIG for Red Hat OpenShift is now available
September 11, 2023 - Red Hat
To help government agencies and regulated industries embrace cloud-native innovation at scale while enhancing their security posture, we are pleased to announce the publication of the Security Technical Implementation Guide (STIG) from the Defense Information Systems Agency (DISA) for Red Hat OpenShift 4…read more
Modernizing defense software factories
September 7, 2023 - Red Hat
The Department of Defense (DoD) software modernization strategy is a department-wide plan to reduce software delivery time from years to just minutes through comprehensive changes to processes, policies, workforce, and technology. It was approved on March 30, 2023, by DoD Chief Information Officer (CIO), John Sherman…read more
Better securing the frontlines: Leveraging Ansible Automation Platform and AIDE for DoD file integrity
August 17, 2023 - Jonathon Wells
A lot of system administrators within the Department of Defense already use the Advanced Intrusion Detection Environment (AIDE). This is mainly because of a Security Technical Implementation Guide (STIG) that states that a file integrity checker must be configured to verify extended file attributes. There are a lot of features to AIDE, and the combination of using AIDE with Red Hat Ansible Automation Platform gives you the ability to automate important corrections to your system configuration…read more
Policy-based security in JWCC: Putting the Sec in DevSecOps
August 1, 2023 - Tim Ryan
There’s a movement going on in the world of Department of Defense (DoD) applications. The momentum surrounding application modernization efforts means containerized applications show growth in the DoD. That, combined with task orders coming out using the Joint Warfighting Cloud Capability (JWCC) contract, leads to the question, “How do we increase the security of containerized applications in this new landscape?”...read more
DISA releases the first Ansible STIG
April 11, 2023 - Red Hat
Red Hat achieves a wide range of cybersecurity validations for our products in global markets and by providing actionable information for organizations to improve their system security footprint. With this in mind, the first Security Technical Implementation Guide (STIG) for the automation controller in Red Hat Ansible Automation Platform is now published and available for download at the Department of Defense (DoD) Cyber Exchange…read more
Taking patch management to the next level with automation
January 19, 2023 - Will Tome
The term “patching” dates back to the days of punch cards when a programmer would literally patch a hole in a punch card to correct a bug. This allowed the programmer to correct mistakes without re-punching the entire card. What a painfully manual process that would have been to scale!...read more
How government might benefit from edge computing
April 23, 2021 - Adrian Keward
Edge computing has the potential to enable more efficient, more insightful, and more cost-effective management of a range of public services. But adoption of edge computing technologies by government organizations has been a long time coming. Now, having seen the value it delivers in other sectors, is a good time for government departments to consider the advantages of edge computing for themselves…read more
Enhancing application container security and compliance with Podman
September 16, 2022 - Trevor Bryant, Samuel Walker
As organizations adopt container-based ecosystems, the approach to continuous IT security and compliance must shift from traditional system security assessments to new methodologies that account for how cloud-based technologies operate. Containers enable agnosticism amongst cloud computing operating environments by packaging applications, or workloads, within a virtualized environment…read more
A Guide to using Routes, Ingress and Gateway APIs in Kubernetes without vendor lock-in
February 14, 2022 - Matthew Bach and James Harmison
Customers selecting a Kubernetes distribution today (such as Red Hat OpenShift Container Platform), have a lot to consider. One priority we have heard customers considering is a desire to avoid vendor lock-in when choosing how your Kubernetes cluster handles inbound traffic…read more
Build and manage Red Hat Device Edge images with Ansible
May 9, 2023 - Ricardo Noriega De Soto, James Harmison
Red Hat Device Edge is a new solution that delivers a lightweight enterprise-ready Kubernetes distribution called MicroShift combined with an edge-optimized operating system built from Red Hat Enterprise Linux (RHEL). This article will guide you through the process of building your own customized Red Hat Device Edge images, from setting up the necessary building infrastructure to deploying the image on a device or virtual machine…read more
Microsoft Azure Red Hat OpenShift has now attained DoD IL4 in Microsoft Azure Government
July 12, 2023 - Jerome Boutaud and Courtney Grosch
We are excited to announce that in collaboration with Microsoft, Azure Red Hat OpenShift for Microsoft Azure Government has now attained Department of Defense (DoD) Impact Level 4 (IL4) certification. DoD IL4 is designed to store, process, and transmit controlled unclassified information (CUI) related to military or contingency operations…read more
OCP hosted encrypted communications for protected environments
3 ways to encrypt communications in protected environments with Red Hat OpenShift
February 1, 2023 - Cheslav Versky
Use TLS termination to serve certificates to clients using edge, reencryption, and pass-through secured routes in situations where using wildcard characters is unsafe…read more
Establish secure routes and TLS termination with wildcard certificates
February 6, 2023 - Cheslav Versky
An EV Multi-Domain cert secures multiple domains under a single certificate to protect multiple subdomains. Learn more in the second article in this series…read more
Use service mesh and mTLS to establish secure routes and TLS termination
February 7, 2023 - Cheslav Versky
Configure Istio-based Red Hat OpenShift Service Mesh to encrypt TLS communication…read more
Use Keycloak SSO and TLS to build secure routes
February 8, 2023 - Cheslav Versky
Keycloak, Red Hat SSO's upstream, allows single sign-on with identity and access management based on popular standards. Learn more in the fourth article in this series…read more
Ask an OpenShift Admin (Ep 48): Disconnected Deep Dive
OpenShift Coffee Break: OpenShift Disconnected on AWS
About the author
Red Hat is the world’s leading provider of enterprise open source software solutions, using a community-powered approach to deliver reliable and high-performing Linux, hybrid cloud, container, and Kubernetes technologies.
Red Hat helps customers integrate new and existing IT applications, develop cloud-native applications, standardize on our industry-leading operating system, and automate, secure, and manage complex environments. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. As a strategic partner to cloud providers, system integrators, application vendors, customers, and open source communities, Red Hat can help organizations prepare for the digital future.
More like this
Browse by channel
Automation
The latest on IT automation for tech, teams, and environments
Artificial intelligence
Updates on the platforms that free customers to run AI workloads anywhere
Open hybrid cloud
Explore how we build a more flexible future with hybrid cloud
Security
The latest on how we reduce risks across environments and technologies
Edge computing
Updates on the platforms that simplify operations at the edge
Infrastructure
The latest on the world’s leading enterprise Linux platform
Applications
Inside our solutions to the toughest application challenges
Original shows
Entertaining stories from the makers and leaders in enterprise tech
Products
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Cloud services
- See all products
Tools
- Training and certification
- My account
- Customer support
- Developer resources
- Find a partner
- Red Hat Ecosystem Catalog
- Red Hat value calculator
- Documentation
Try, buy, & sell
Communicate
About Red Hat
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
Select a language
Red Hat legal and privacy links
- About Red Hat
- Jobs
- Events
- Locations
- Contact Red Hat
- Red Hat Blog
- Diversity, equity, and inclusion
- Cool Stuff Store
- Red Hat Summit