OpenShift 4.3: Quay Container Security Integration

OpenShift 4.3: Quay Container Security Integration

Overview In the Red Hat OpenShift 4.2 Web UI Console, we introduced a new Cluster Overview Dashboard as the landing page when users first log in. The dashboard is there to help users resolve issues more efficiently and maintain a healthy cluster. With the latest 4.3 release, we added an image security section to the […]

Read More...

Introducing Red Hat OpenShift 4.3 to Enhance Kubernetes Security

Introducing Red Hat OpenShift 4.3 to Enhance Kubernetes Security

Today Red Hat announces the forthcoming general availability of Red Hat OpenShift 4.3, the newest version of the industry’s most comprehensive enterprise Kubernetes platform. With security a paramount need for nearly every enterprise, particularly for organizations in the government, financial services and healthcare sectors, OpenShift 4.3 delivers FIPS (Federal Information Processing Standard) compliant encryption and […]

Read More...

Taking OpenShift’s Security for Containerized Applications to the next level with Aqua

This is a guest post by Amir Gabrieli of Aqua Security. The Red Hat OpenShift Container Platform has a number of built-in security capabilities. Aqua provides an additional layer of security in development and protects containerized applications in runtime. Aqua recently developed a Kubernetes Operator that was successfully tested and validated by Red Hat OpenShift […]

Read More...

Secure your Microservices

Secure your Microservices

Microservices architectures are becoming the de facto way developers are thinking about how their applications are constructed. But security remains a top concern to most organizations.  Therefore, it is important to understand the intersection of security and microservices. While not guaranteeing your application will be secure, we can look at some of the capabilities that […]

Read More...

Self-Serviced, End-to-End Encryption for Kubernetes Applications, Part 2:  a Practical Example

Self-Serviced, End-to-End Encryption for Kubernetes Applications, Part 2:  a Practical Example

Introduction In part one of this series, we saw three approaches to fully automate the provisioning of certificates and create end-to-end encryption. Based on feedback from the community suggesting the post was a bit too theoretical and not immediately actionable, this article will illustrate a practical example. You can see a recording of the demo […]

Read More...

What Red Hat OpenShift Online and OpenShift Dedicated Customers Should Know About the June 2019 Kernel Network Stack Flaws

What Red Hat OpenShift Online and OpenShift Dedicated Customers Should Know About the June 2019 Kernel Network Stack Flaws

On Monday, June 17, 2019, details were made public about security flaws that impact systems hosting Red Hat OpenShift Online (Starter and Pro) and Red Hat OpenShift Dedicated. For information on the CVEs, visit  CVE-2019-11477, CVE-2019-11478, and CVE-2019-11479.  The vulnerability article can be found here.   The intent of this blog is to notify our […]

Read More...

Using Kubernetes Operators to Manage Let’s Encrypt SSL/TLS Certificates for Red Hat OpenShift Dedicated

Using Kubernetes Operators to Manage Let’s Encrypt SSL/TLS Certificates for Red Hat OpenShift Dedicated

Overview Red Hat OpenShift Dedicated is an enterprise Kubernetes application platform hosted on public cloud providers and managed by Red Hat Site Reliability Engineering (SRE). OpenShift Dedicated enables companies to implement a flexible, hybrid cloud IT strategy by connecting to their datacenter with minimal infrastructure and operating expenses. Valid SSL certificates are part of the […]

Read More...

What Red Hat OpenShift Online and OpenShift Dedicated customers should know about Fallout and RIDL/ZombieLoad/MDS

Earlier this week, details were made public about four CVEs related to microprocessor flaws that impact systems hosting Red Hat OpenShift Online (Starter and Pro) and Red Hat OpenShift Dedicated. Some organizations are referring to these as “Fallout”, “ZombieLoad”, “RIDL”, or collectively as MDS (Microarchitectural Data Sampling). Read additional technical details at these links (CVE-2018-12127, […]

Read More...

Requesting and installing Let’s Encrypt Certificates for OpenShift 4

Requesting and installing Let's Encrypt Certificates for OpenShift 4

Overview Red Hat OpenShift uses certificates to encrypt the communication with the Web Console as well as applications exposed as Routes. Without any further customization the install process will create self-signed certificates. While these work they usually trigger severe security warnings about unknown certificates in Web Browsers when accessing either the Web Console or any […]

Read More...