,欢迎您!
登录您的红帽帐户
尚未注册?下面是您应该进行注册的一些理由:
- 从一个位置浏览知识库文章、管理支持案例和订阅、下载更新以及执行其他操作。
- 查看组织内的用户,以及编辑他们的帐户信息、偏好设置和权限。
- 管理您的红帽认证,查看考试历史记录,以及下载认证相关徽标和文档。
您可以使用红帽帐户访问您的会员个人资料、偏好设置以及其他服务,具体决取决于您的客户状态。
出于安全考虑,如果您在公共计算机上通过红帽服务进行培训或测试,完成后务必退出登录。
退出红帽博客
Blog menu
Hand-in-hand with the explosive growth of data and iCloud services comes a range of security threats, all of which can be addressed with software-defined storage. To learn how, register for the following webinars – the link is at the bottom of the post!
Attack vectors used against storage technologies
To better prepare you for threats, Neil Levine, Director of product management, Red Hat Ceph, Red Hat, explores potential security issues, pitfalls, and attack vectors used against storage technologies. Then, to provide avenues to address these security threats, Levine discusses how the industry has converged on an open software-defined storage model that can offer more robust security than traditional systems. And, along the way, Levine will provide use best practices you can employ in your organization including these key tips for building security in a Linux environment:
- Close ports, limit users
- Shutdown unnecessary processes
- Don’t run as root
- Use https and ssh only
- MAC: SELinux, AppArmor
Enterprise-grade security from Red Hat Storage
Jeff Darcy, Principal software engineer, Red Hat, provides a detailed view of new features that enable a secure and robust environment in the latest release of the Red Hat Storage portfolio. Features that will arm you to both protect and defend against the security threats facing IT departments, today.
For example, key features when running in an SELinux environment include:
- Two levels: internal vs. external
- Internal: RHGS servers use SELinux themselves
- Community: not our package, user must set up
- External: we store and propagate users’ SELinux labels
- Interpretation/enforcement done on clients
To register for these webinars, click here.