Skip to contentRed Hat AI
  • Overview

    • AI news
    • Technical blog
    • Live AI events
    • Inference explained
    • See our approach
  • Products

    • Red Hat AI Enterprise
    • Red Hat AI Inference Server
    • Red Hat Enterprise Linux AI
    • Red Hat OpenShift AI
    • Explore Red Hat AI
  • Engage & learn

    • Learning hub
    • AI topics
    • AI partners
    • Services for AI
Hybrid cloud
  • Platform solutions

    • Artificial intelligence

      Build, deploy, and monitor AI models and apps.

    • Linux standardization

      Get consistency across operating environments.

    • Application development

      Simplify the way you build, deploy, and manage apps.

    • Automation

      Scale automation and unite tech, teams, and environments.

  • Use cases

    • Virtualization

      Modernize operations for virtualized and containerized workloads.

    • Digital sovereignty

      Control and protect critical infrastructure.

    • Security

      Code, build, deploy, and monitor security-focused software.

    • Edge computing

      Deploy workloads closer to the source with edge technology.

  • Explore solutions
  • Solutions by industry

    • Automotive
    • Financial services
    • Healthcare
    • Industrial sector
    • Media and entertainment
    • Public sector (Global)
    • Public sector (U.S.)
    • Telecommunications

Discover cloud technologies

Learn how to use our cloud products and solutions at your own pace in the Red Hat® Hybrid Cloud Console.

Products
  • Platforms

    • Red Hat AI

      Develop and deploy AI solutions across the hybrid cloud.

    • Red Hat Enterprise Linux

      Support hybrid cloud innovation on a flexible operating system.

    • Red Hat OpenShift

      Build, modernize, and deploy apps at scale.

    • Red Hat Ansible Automation Platform

      Implement enterprise-wide automation.

  • Featured

    • Red Hat OpenShift Virtualization Engine
    • Red Hat OpenShift Service on AWS
    • Microsoft Azure Red Hat OpenShift
    • See all products
  • Try & buy

    • Start a trial
    • Buy online
    • Integrate with major cloud providers
  • Services & support

    • Consulting
    • Product support
    • Services for AI
    • Technical Account Management
    • Explore services
Training
  • Training & certification

    • Courses and exams
    • Certifications
    • Skills assessments
    • Red Hat Academy
    • Learning subscription
    • Explore training
  • Featured

    • Red Hat Certified System Administrator exam
    • Red Hat System Administration I
    • Red Hat Learning Subscription trial (No cost)
    • Red Hat Certified Engineer exam
    • Red Hat Certified OpenShift Administrator exam
  • Services

    • Consulting
    • Partner training
    • Product support
    • Services for AI
    • Technical Account Management
Learn
  • Build your skills

    • Documentation
    • Hands-on labs
    • Hybrid cloud learning hub
    • Interactive learning experiences
    • Training and certification
  • More ways to learn

    • Blog
    • Events and webinars
    • Podcasts and video series
    • Red Hat TV
    • Resource library

For developers

Discover resources and tools to help you build, deliver, and manage cloud-native applications and services.

Partners
  • For customers

    • Our partners
    • Red Hat Ecosystem Catalog
    • Find a partner
  • For partners

    • Partner Connect
    • Become a partner
    • Training
    • Support
    • Access the partner portal

Build solutions powered by trusted partners

Find solutions from our collaborative community of experts and technologies in the Red Hat® Ecosystem Catalog.

Search

I'd like to:

  • Start a trial
  • Buy a learning subscription
  • Manage subscriptions
  • Contact sales
  • Contact customer service
  • See Red Hat jobs

Help me find:

  • Documentation
  • Developer resources
  • Tech topics
  • Architecture center
  • Security updates
  • Customer support

I want to learn more about:

  • AI
  • Application modernization
  • Automation
  • Cloud-native applications
  • Linux
  • Virtualization
ConsoleDocsSupportNew For you

Recommended

We'll recommend resources you may like as you browse. Try these suggestions for now.

  • Product trial center
  • Courses and exams
  • All products
  • Tech topics
  • Resource library
Log in

Get more with a Red Hat account

  • Console access
  • Event registration
  • Training & trials
  • World-class support

A subscription may be required for some services.

Log in or register
Contact us
  • Home
  • Resources
  • 4 ways Red Hat OpenShift Virtualization improves security focus

4 ways Red Hat OpenShift Virtualization improves security focus

December 22, 2025•
Resource type: Checklist
Download PDF

Use this checklist to focus your security efforts and apply consistent controls across virtual machines (VMs) and containers in your hybrid cloud. Here are 4 ways you can use Red Hat® OpenShift® Virtualization tools to strengthen security posture and protect workloads.

1. Harden the platform from the ground up

OpenShift Virtualization runs on Red Hat OpenShift, which provides a hardening-ready foundation and can manage both containers and VMs. This provides consistent security enforcement across every workload.

  • Enforce compliance baselines in Red Hat OpenShift with Red Hat’s Compliance Operator. The Compliance Operator lets  administrators describe the required compliance state of a cluster and then provides them with an overview of gaps and ways to remediate them.
  • Restrict GPU and USB pass-through to approved devices to reduce the risk of unauthorized data access or code execution from attached hardware.
  • Disable nonessential feature gates and enforce trusted container registries using Transport Layer Security (TLS) to limit exposure to unverified images and misconfigurations.

2. Control workloads at every layer

By managing VMs as Kubernetes objects, OpenShift Virtualization gives you fine-grained control over who can create, modify, and interact with workloads. Apply role-based access control (RBAC) and audit policies consistently so that changes to critical VMs follow the same governance model as containerized applications.

  • Restrict executive access, Virtual Network Computing (VNC) console access, and live migration operations to approved administrators to reduce the risk of unauthorized changes or data exposure.
  • Disable guest-memory overcommit and shareable disks where they are not required to reduce resource contention between tenants and limit exposure if a single workload is compromised.
  • Enforce consistent error-handling and validation policies for critical workloads to avoid inconsistent behavior across environments and reduce the risk of silent failures or data corruption.

3. Segment network traffic to enhance security posture

Security in OpenShift Virtualization extends to network configuration. Networking controls apply at both the container and VM levels so you can keep the same microsegmentation model across all workloads.

Apply consistent network policies, observability, and logging across these environments to detect suspicious traffic patterns more quickly and simplify troubleshooting.

  • Use Virtual Local Area Networks (VLANs) to isolate tenant or application traffic to reduce the risk of lateral movement between network segments.
  • Apply Media Access Control (MAC) address spoof filtering and multinetwork policies for sensitive workloads to help prevent identity spoofing on the network and keep traffic for high-value applications isolated.
  • Define clear boundaries for secondary networks, such as Single Root I/O Virtualization (SR-IOV) interfaces, and map them to specific workloads or tenants so that traffic that bypasses the virtual switch remains controlled and auditable.

4. Safeguard data integrity in storage

OpenShift Virtualization brings storage security policies into the same management plane as compute and networking.

You can apply the same encryption, access controls, and replication policies across virtualized and containerized workloads to streamline compliance and recovery planning. Centralizing these controls also makes it easier for storage, security, and platform teams to collaborate on consistent policies and audit them over time.

  • Restrict DataVolume (DV) cloning across namespaces to keep sensitive datasets within approved boundaries and avoid unintended propagation of regulated or high-risk information.
  • Disable unnecessary shareable disks to reduce unintended data sharing between workloads and lower the risk of corruption from concurrent writes.
  • Validate errorPolicy settings and storage permissions for critical data to make sure failed storage operations are handled predictably and only authorized workloads can read from or write to sensitive volumes.

Next steps

Read the full OpenShift Virtualization hardening guide for a comprehensive look at how to harden your organization’s IT environment across your hybrid cloud.

Tags:Virtualization

Red Hat logoLinkedInYouTubeFacebookX

Platforms

  • Red Hat AI
  • Red Hat Enterprise Linux
  • Red Hat OpenShift
  • Red Hat Ansible Automation Platform
  • See all products

Tools

  • Training and certification
  • My account
  • Customer support
  • Developer resources
  • Find a partner
  • Red Hat Ecosystem Catalog
  • Documentation

Try, buy, & sell

  • Product trial center
  • Red Hat Store
  • Buy online (Japan)
  • Console

Communicate

  • Contact sales
  • Contact customer service
  • Contact training
  • Social

About Red Hat

Red Hat is an open hybrid cloud technology leader, delivering a consistent, comprehensive foundation for transformative IT and artificial intelligence (AI) applications in the enterprise. As a trusted adviser to the Fortune 500, Red Hat offers cloud, developer, Linux, automation, and application platform technologies, as well as award-winning services.

  • Our company
  • How we work
  • Customer success stories
  • Analyst relations
  • Newsroom
  • Open source commitments
  • Our social impact
  • Jobs

Change page language

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility