OpenShift Security Automation
GLEN KOSAKA Container Security RedHat OpenShift Leave a Comment
Containers and tools like Red Hat OpenShift enable enterprises to automate many aspects of application deployment, with many significant business benefits. But it’s easy to forget to automate the security aspects of containers. There are many built-in features for OpenShift security automation in the platform, but don’t stop there. Automating run-time security for OpenShift deployments is just as critical for preventing damaging exploits and attacks.
By now you may realize that container deployments are just as vulnerable to attacks and exploits from hackers and insiders as traditional environments, making OpenShift security automation a critical component for all deployments. For an excellent overview of Kubernetes security, see this post. It’s important to build in security into all phases of the CI/CD container deployment life cycle.
Here is an overview of the Red Hat OpenShift platform, products, and advice for locking down systems before containers are deployed to production. In this video, Andrew Toth from Red Hat outlines typical threats and security measures to protect container deployments and will share information on built-in security features of OpenShift and Kubernetes. Glen Kosaka from NeuVector then presents OpenShift security automation by using advanced Kubernetes container security features to improve visibility and protection in production.
In addition to the core container firewall features discussed in the video, NeuVector provides integration with the Red Hat OpenShift platform to make it easier for security and devops teams to automate OpenShift security. Here are some of the integration points between NeuVector and OpenShift.
Image Vulnerability Scanning – Enforcement by OpenShift
NeuVector, through the Jenkins plug-in, is able to scan images during the build process and tag them based on vulnerabilities discovered. OpenShift is able to control the deployment of containers based on tags, so containers with certain vulnerability profile or status are allowed or prevented from being deployed.
Registry Integration
NeuVector is able to scan the images in local OpenShift registries for vulnerabilities. Any images pushed to the registry(s) will be automatically scanned. Scanning can be configured to filter only selected directories if desired.
Role-Based Access Controls
NeuVector automatically reads the RBACs configured in OpenShift and allows these users and roles to be mapped to the NeuVector product. Access to the NeuVector console and API can be controlled in this seamless way. For example, developers who can access the Guest project in OpenShift can be granted read only access to see Guest network connections and security events in NeuVector. Cluster admins can be granted access to all projects in NeuVector in order to review and set security policy for them.
Run-Time Security Policy
NeuVector supports automated creation of policy rules to isolate application network traffic and allowed container processes. These rules can be programmatically created using the NeuVector REST API and integrated into the OpenShift deployment pipeline. NeuVector supports using OpenShift project names (namespaces), labels, and other identifiers as part of the policy rule set.
OpenShift Security Automation In Practice
There are many built-in security features in the Red Hat OpenShift platform, and many of these can be automated as part of the CI/CD process. NeuVector extends these security features and integrates with OpenShift to automate run-time security in as seamless a way as possible.
Categories
- Container Security (75)
- Cloud Security (35)
- Docker Security (30)
- Kubernetes Security (26)
- Press Releases (21)
- Container Threats (18)
- Network Security (18)
- Articles (14)
- Kubernetes (13)
- Vulnerabilities (13)
- Container Networking (8)
- Container Firewall (7)
- Exploits (7)
- RedHat OpenShift (7)
- cloud-native security (7)
- AWS (6)
- Partnerships (6)
- Alerts (4)
- Ebooks + Guides (4)
- data loss prevention (4)
- security automation (4)
- service mesh (4)
- Cloud services (3)
- Compliance (3)
- Cyber Attacks (3)
- Kubernetes system (3)
- Microservices (3)
- NeuVector Product (3)
- Serverless (3)
- dlp (3)
- AWS ECS (2)
- CI/CD (2)
- CIS Benchmark (2)
- Customer Stories (2)
- Docker (2)
- Infrastructure as Code (2)
- Istio (2)
- Open Source (2)
- PCI Compliance (2)
- PCI-DSS (2)
- Slider Ebooks & Guides (2)
- Terraform (2)
- VMware (2)
- run-time (2)
- security mesh (2)
- shift left (2)
- waf (2)
- Alibaba (1)
- App Mesh (1)
- Backdoor (1)
- Banking (1)
- Black Duck Software (1)
- Docker Hub (1)
- Docker Networking (1)
- Docker container firewall (1)
- ECS (1)
- EKS (1)
- Events (1)
- Financial Services (1)
- GDPR (1)
- IBM Cloud (1)
- Internet of Things (1)
- JFrog (1)
- Jenkins (1)
- Knative (1)
- OpenShift (1)
- Secrets (1)
- VMware Photon (1)
- Virtual Patching (1)
- Webinar (1)
- admission control (1)
- application security (1)
- container risk score (1)
- cpu optimization (1)
- crypto (1)
- data breach (1)
- dpi (1)
- grafana (1)
- linkerd2 (1)
- micro-perimeter (1)
- monitoring (1)
- pci (1)
- prometheus (1)
- rancher (1)
- real-time containers (1)
- sdlc (1)
- sensitive data (1)