Definitive guide to Red Hat OpenShift security
This definitive guide helps security teams with ways to reduce potential exploitation and malicious activity when using OpenShift clusters. It includes details about the need to create new policies and vet images, configurations, and account access for any new applications that will be deployed into the cluster. It’s based on Red Hat OpenShift Container Platform 4.5. Read this comprehensive technology detail document to learn more.