联系我们

Video

Automating security compliance for physical, virtual, cloud, and container environments

About this video

Learn how to easily provision a security-compliant host and quickly detect and remediate security and compliance issues in physical, virtual, cloud, and container environments. We’ll discuss possible compliance challenges and show how a combination of Red Hat CloudForms, Red Hat Satellite, and Ansible Tower by Red Hat can help you quickly achieve compliance, automate security, and complete remediation. You’ll learn how you can integrate Red Hat CloudForms with Red Hat Satellite and Ansible Tower by Red Hat, as well as use the OpenSCAP integration in Red Hat Satellite, to perform audit scans and remediations at the push of a button on your systems and automate security to ensure compliance against various profiles, such as: 

The U.S. Government Configuration Baseline (USGCB). 
The Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG). 
The Centralized Supercomputing Facility (CSCF) baseline. 
The U.S. Government Commercial Cloud Services (C2S) baseline. 
The Certified Cloud and Service Provider (CCSP) baseline. 
Center for Internet Security (CIS) Benchmarks. 
The Payment Card Industry Data Security Standard (PCI DSS) Custom policies. 

You'll also learn how you can use the control and policy engine in Red Hat CloudForms to detect and fix vulnerabilities, such as Shellshock, and learn how to do proactive security and automated risk management with Red Hat Insights. 

Learn more: www.redhat.com/management

Video channel
Demos
Run time
42:41
Date
Red Hat logoLinkedInYouTubeFacebookTwitter

产品

工具

试用、购买或出售

沟通

关于红帽

我们是世界领先的企业开源解决方案供应商,提供包括 Linux、云、容器和 Kubernetes。我们致力于提供经过安全强化的解决方案,从核心数据中心到网络边缘,让企业能够更轻松地跨平台和环境运营。

订阅我们的新闻稿 Red Hat Shares

立即注册

选择语言