Like the castle stonemason, engineers and operators must learn and master core tools and techniques to prove that deployed containerized applications are safe and protected. To be successful, they must understand how to manage and use Linux® components and properties, such as multi-tenancy isolation and least-privilege configuration, to secure containers.
This webinar explores the moats, walls, and gatehouses that fortify Red Hat® OpenShift® Container Platform; introducing attendees to the critical features of a rock-solid infrastructure. Get a comprehensive guided tour of the foundational technologies that are the building blocks of today's multilayer security model for containerized applications, both on-premise and in the cloud.
The webinar will cover:
- Red Hat virtualization and container architecture.
- Multitenant segregation, such as the multiple types of namespaces, SELinux including multi category security (MCS), and resource management (cgroups).
- Least-privilege application restrictions, such as kernel restrictions (capabilities) and secure computing (seccomp).
- How containers use existing, mature Red Hat Enterprise Linux features to protect applications from security problems caused by external manipulation, improper resource allocation and misuse, operator errors and unauthorized access, and file system mismanagement.
This webinar content is appropriate for all architects, developers, operations engineers, and technical leads with a foundational knowledge of containers. While these techniques are being uniquely applied to the evolving container ecosystem, the underlying technologies are robust components in the Red Hat portfolio of products. These techniques can also be applied to other modern Linux application designs like serverless functions, enterprise virtualization or legacy application processes.
Live-event date: Thursday, January 31, 2019 | 9 a.m. & 2 p.m. ET
On-demand date: Available for one year afterward.