Learn how to easily provision a security-compliant host and quickly detect and remediate security and compliance issues in physical, virtual, cloud, and container environments. We’ll discuss possible compliance challenges and show how a combination of Red Hat CloudForms, Red Hat Satellite, and Ansible Tower by Red Hat can help you quickly achieve compliance, automate security, and complete remediation. You’ll learn how you can integrate Red Hat CloudForms with Red Hat Satellite and Ansible Tower by Red Hat, as well as use the OpenSCAP integration in Red Hat Satellite, to perform audit scans and remediations at the push of a button on your systems and automate security to ensure compliance against various profiles, such as:
The U.S. Government Configuration Baseline (USGCB).
The Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG).
The Centralized Supercomputing Facility (CSCF) baseline.
The U.S. Government Commercial Cloud Services (C2S) baseline.
The Certified Cloud and Service Provider (CCSP) baseline.
Center for Internet Security (CIS) Benchmarks.
The Payment Card Industry Data Security Standard (PCI DSS) Custom policies.
You'll also learn how you can use the control and policy engine in Red Hat CloudForms to detect and fix vulnerabilities, such as Shellshock, and learn how to do proactive security and automated risk management with Red Hat Insights.
Learn more: www.redhat.com/management
- 2017年 6月 8日