Log in / Register Account

Security

Red Hat’s approach to hybrid cloud security

Red Hat provides the technologies to build and deploy applications across a hybrid cloud more securely. We take a layered, defense-in-depth approach that helps customers implement security across the entire infrastructure and application stack and life cycle.

Containers and hybrid cloud technologies have made the security landscape much more complex. Security teams are increasingly finding it challenging to keep up with the changing risks, compliance requirements, tools, and architectural changes introduced by these technologies.

Traditional perimeter-based network security is no longer effective on its own, and security teams must rethink their approach.

Security should be implemented within each layer of the application and infrastructure stack. People and processes should be aligned to continuously monitor and address security early in an automated way.

Defense-in-depth for the hybrid cloud

With modern hybrid cloud infrastructure, security has to span the entire stack, not just in your data center but also in the public cloud.

A defense-in-depth strategy is essential. That means not relying on any one piece of your security strategy to always work. Rather, it’s an integrated and layered security strategy of people, process, and technology.

Red Hat provides the technologies to build, manage, and automate a hybrid cloud  securely in a layered, defense-in-depth security strategy across the entire infrastructure and application stack and life cycle. Specifically, a layered, defense-in-depth security strategy that uses the capabilities of each layer in your environment, including operating systems, container platforms, automation tools, Software-as-a-Service (SaaS) assets, and cloud services.

Additionally, Red Hat's extensive partner ecosystem enhances and extends features and functionality provided by Red Hat.

Safeguarding against supply chain attacks in hybrid cloud

You are only as secure as your weakest link. However, across a hybrid-cloud environment, it can be difficult to see where those links are. Starting with Linux® and beyond, Red Hat works with upstream open source communities to make enterprise-ready software that’s hardened, tested, and securely distributed.

Security in open source software

Icons-Red_Hat-Diagrams-Development_Model-A-Black-RGB

Upstream community leadership

Icon-Red_Hat-Progression-A-Black-RGB

Review, track, and select packages for release

Static code analysis

Icon-Red_Hat-Thumbs_up-A-Black-RGB

Security hardening and quality assurance testing

Icon-Red_Hat-Transportation-Truck-A-Black-RGB

Secure distribution of digitally signed packages

Icon-Red_Hat-Objects-Shield-A-Black-RGB

Continuous security updates

Security across the stack and life cycle

Security is not a bolt-on afterthought. It must be integrated throughout the entire infrastructure and application stack and life cycle.

Red Hat works to help you build security into applications, deploy applications onto a hardened platform, and manage, automate, and adapt your infrastructure and applications as security and compliance requirements change.

  • Design: Identify security requirements and governance models
  • Build: Security built into the application stack and life cycle from the start, not bolted on
  • Run: Deploy to trusted platforms with enhanced security capabilities
  • Manage and automate: Automate infrastructure and application development for improved security and compliance
  • Adapt: Revise, update, remediate as the security landscape changes

A foundation for DevSecOps

A layered, defense-in-depth security strategy across the entire infrastructure and application stack and life cycle is key to both hybrid cloud security and DevSecOps.

DevOps fused the disciplines of software development and IT operations into a collaborative way of working. Forward-looking DevOps teams recognized the importance of including security in this DevOps model, leading to the birth of DevSecOps.

DevSecOps means thinking about application and infrastructure security from the start. It also means automating security operations to keep the DevOps workflow from slowing down. 

It underscores the need to help developers code with security in mind, a process that involves security teams sharing visibility, feedback, and insights on known threats.

Case study

Building a cloud solution for highly regulated industries

Cloud service provider ORock Technologies needed a technology partner to help it build a more secure enterprise open source cloud solution for government and highly regulated industries. Red Hat worked with ORock to build a cloud environment on Red Hat® OpenStack® Platform, a container service on Red Hat OpenShift®, and to gain Federal Risk and Authorization Management Program (FedRAMP) accreditation.

Security in Red Hat offerings

The leading enterprise Linux operating system, certified on hundreds of clouds and with thousands of vendors. Built-in tools help you ensure compliance and increase security.

Red Hat Openshift

An enterprise-ready Kubernetes container platform with full-stack automated operations to manage hybrid cloud and multicloud deployments. Increase container security with built-in capabilities for policies and controls.

Red Hat Ansible Automation Platform

A platform for implementing consistent enterprise-wide automation, no matter where you are in your automation journey. Reduce the risks caused by misconfigurations and manual errors with automation, and streamline your security operations while integrating security into the process, with access control, logging and auditing capabilities.

Learn more about Red Hat's approach to security