The castle guided tour: Explaining multilevel container security technology, from the moat to the throne room

Watch recording from 31 de janeiro de 2019

Like the castle stonemason, engineers and operators must learn and master core tools and techniques to prove that deployed containerized applications are safe and protected. To be successful, they must understand how to manage and use Linux® components and properties, such as multi-tenancy isolation and least-privilege configuration, to secure containers. 

This webinar explores the moats, walls, and gatehouses that fortify Red Hat® OpenShift® Container Platform; introducing attendees to the critical features of a rock-solid infrastructure. Get a comprehensive guided tour of the foundational technologies that are the building blocks of today's multilayer security model for containerized applications, both on-premise and in the cloud.  

The webinar will cover:

  • Red Hat virtualization and container architecture.
  • Multitenant segregation, such as the multiple types of namespaces, SELinux including multi category security (MCS), and resource management (cgroups).
  • Least-privilege application restrictions, such as kernel restrictions (capabilities) and secure computing (seccomp).
  • How containers use existing, mature Red Hat Enterprise Linux features to protect applications from security problems caused by external manipulation, improper resource allocation and misuse, operator errors and unauthorized access, and file system mismanagement.  

This webinar content is appropriate for all architects, developers, operations engineers, and technical leads with a foundational knowledge of containers. While these techniques are being uniquely applied to the evolving container ecosystem, the underlying technologies are robust components in the Red Hat portfolio of products. These techniques can also be applied to other modern Linux application designs like serverless functions, enterprise virtualization or legacy application processes.


Live-event date: Thursday, January 31, 2019 | 9 a.m. & 2 p.m. ET

On-demand date: Available for one year afterward.

Philip Sweany

cloud architect, Red Hat

Phil Sweany is a cloud architect at Red Hat. He is a Red Hat Certified Architect (RHCA) and a specialist in designing cloud and security training courses, including an upcoming container security course from which this webinar takes its content. Phil has over 3 decades of experience in technical education and consulting, including 15 years with Sun Microsystems, and has been with Red Hat Training since 2008. Phil holds numerous administration and security certifications.