Red Hat applauds the recent release of Kubernetes hardening guidance from the US National Security Agency (NSA) and the US Cybersecurity and Infrastructure Agency (CISA) to improve the nation’s cybersecurity through their collaborative efforts. Cybersecurity is a team sport and Red Hat is pleased to help foster government and industry collaboration. This guidance will be especially useful to security practitioners in both public and private sectors who can benefit from the experience of leading cybersecurity experts.
Red Hat has long recognized the need to provide our customers and users with robust documentation and guidance. It is what makes our products “enterprise ready.” We start with doing the hard work of analyzing security concerns with open source technologies.
Red Hat has developed a significant amount of hardening guidance for OpenShift Container Platform (OCP) (its distribution of Kubernetes), with a strong alignment to the new guidance from NSA and CISA on the technical security controls, including, for example, a combination of the default settings for OCP and existing profiles for use with the OpenShift Compliance Operator, such as the Center for Internet Security (CIS) benchmarks.
Red Hat also continues to prioritize software life cycle development practices and utilize automation to make the application of security policy easier to do and govern at scale. Automation in OCP via OpenShift platform operators may be used to apply security guidance or monitor for configuration drift. The OpenShift Compliance Operator (powered by SCAP security content built via an open source community at ComplianceAsCode), the OpenShift File Integrity operator and tools like StackRox (now Red Hat Advanced Cluster Security) or Advanced Cluster Manager (ACM) assist in delivering policy-based security, governance and risk management to minimize errors, apply consistency and lower total level of effort.
As Kubernetes is a core component of Red Hat’s OpenShift Container Platform (OCP), Red Hat has already made huge investments. Red Hat engineering teams test and evaluate the security attributes of these technologies using techniques such as static code analysis, automated CI/CD testing, and performance reliability testing among other approaches. We work to equip our enterprise products with hardened defaults, or security baselines like validated STIGs or CIS benchmarks. OpenShift Security Context Constraints (SCCs) (comparable to Kubernetes Pod Security Policies) exemplify Red Hat’s commitment to security. SCCs are on by default and are used to control permissions for pods. Although Kubernetes Pod Security Policies are deprecated, Red Hat continues to support Security Context Constraints in OCP for the entirety of its lifecycle.
In the event organizations are unable or don’t want to dedicate resources to install, configure, and develop the skills required to maintain and manage their Kubernetes adoption on their own, Red Hat offers OpenShift managed service options.
N.B. This is an updated version of an earlier blog.
저자 소개
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
가상화
온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래