The Center for Internet Security® (CIS®) has officially published guidance for hardening Red Hat OpenShift Virtualization.

The official publication of the new CIS Benchmark® for Red Hat OpenShift Virtualization is an important development for organizations running traditional virtual machines (VMs) alongside modern containers. OpenShift Virtualization is a feature of Red Hat OpenShift that allows existing VM-based workloads to run directly on the platform. This globally recognized, consensus-driven benchmark provides recommendations for creating a security-focused configuration for those environments.

Who is CIS and what is a CIS Benchmark?

CIS is a community-driven nonprofit organization, which aims to "make the connected world a safer place" for businesses, governments, and people by developing and promoting best practice solutions.

The CIS Benchmarks are one of those core solutions. They are a set of globally recognized best practices to help secure configuring operating systems (OSs), servers, and other technology. Developed and maintained by a global community of IT professionals, the CIS Benchmarks provide prescriptive instructions for creating a security-focused configuration baseline. The new CIS Benchmark for OpenShift Virtualization was developed based on the OpenShift Virtualization Hardening Guide.

CIS Benchmark

Key security optimizations

The CIS Benchmark provides detailed recommendations to strengthen your security posture by focusing on 4 key areas of optimization, including:

  • Harden the platform from the ground up: This includes guidance on restricting GPU and USB pass-through to approved devices and disabling non-essential feature gates.
  • Control workloads at every layer: The CIS Benchmark provides fine-grained controls, such as restricting exec and virtual network computing (VNC) access to approved administrators and disabling features like guest-memory overcommit.
  • Segment and protect network traffic: This area focuses on using networking controls like Virtual Local Area Networks (VLANs) to isolate tenant or application traffic and applying Media Access Control (MAC) spoof filtering.
  • Safeguard data integrity in storage: This extends security policies into the storage plane, with recommendations to restrict data volume cloning across namespaces and disable unnecessary shareable disks.

How to implement

Here is the good news: implementing this benchmark is less about complex reconfiguration and more about simple verification. Because OpenShift Virtualization is engineered to have maximum security controls in place out-of-the-box, you likely have the majority of these protections in place already. The benchmark simply acts as prescriptive guidance to help you audit your environment. To get started, just cross-reference your current setup against the OpenShift Virtualization Hardening Guide to ensure those standard safety settings haven’t been altered.

Get the CIS Benchmark

By implementing the CIS Benchmark for OpenShift Virtualization, your organization can enforce consistent security capabilities across workloads on your hybrid cloud platform, protecting both your containerized and virtualized applications.

To see the full list of recommendations and download the CIS Benchmark, visit the official CIS Benchmarks page.

Red Hat Product Security

Red Hat은 모든 직원이 근무 위치와 상관없이 보안 및 개인정보 위험을 완화하는 데 필요한 양질의 정보와 그렇게 할 수 있는 액세스 권한을 이용할 자격이 있다고 믿습니다.

저자 소개

Dan Bettinger is a tech marketing innovator who has carved a unique path through the evolving landscape of cloud computing, blockchain, and DevOps. Currently serving as Principal Product Marketing Manager for OpenShift at Red Hat, Dan's career highlights include spearheading J.P. Morgan's groundbreaking blockchain network and hosting the IBM Cloud Podcast, where he reached thousands of listeners per episode.

UI_Icon-Red_Hat-Close-A-Black-RGB

채널별 검색

automation icon

오토메이션

기술, 팀, 인프라를 위한 IT 자동화 최신 동향

AI icon

인공지능

고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트

open hybrid cloud icon

오픈 하이브리드 클라우드

하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요

security icon

보안

환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보

edge icon

엣지 컴퓨팅

엣지에서의 운영을 단순화하는 플랫폼 업데이트

Infrastructure icon

인프라

세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보

application development icon

애플리케이션

복잡한 애플리케이션에 대한 솔루션 더 보기

Virtualization icon

가상화

온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래