NeuVector First to Demonstrate Red Hat OpenShift ‘CIS Inspired’ Security Benchmarks
GLEN KOSAKA Container Security RedHat OpenShift Compliance CIS Benchmark Leave a Comment
Today NeuVector demonstrated its ‘tech-preview’ implementation of important draft security benchmarks for the Red Hat OpenShift Platform. These benchmarks, drafted by the Red Hat OpenShift team and inspired by the CIS Benchmarks for Kubernetes, provide an important and much needed set of security auditing checks for the deployment of OpenShift.
The benchmarks, similar to the ones for Kubernetes, evaluate the configuration of the master node components such as the critical api-server or etcd control plane containers, worker node components such as the kubelet, and other orchestrator, host, and container configurations to provide a Pass or Warning status for each check, as well as an overall benchmark score. If appropriate, remediation advice is provided for each check.
NeuVector automatically runs the appropriate master or worker node benchmarks on every OpenShift node in the cluster, displaying the results as shown below.
The results of the OpenShift benchmarks include Profile and Scored entries, which help admins to assess how critical each benchmark is. For example, a Level 1 profile is used for basic security hygiene, while Level 2 profiles are considered more advanced, for defense in depth. The Scored column indicates whether that benchmark’s results will be used in the calculation of the overall security score.
These OpenShift benchmarks are also summarized in the NeuVector Vulnerability and Compliance Explorer tool to help security admins evaluate, track, and report of compliance benchmarks and vulnerabilities.
Admins can also create automated responses for the OpenShift benchmarks by creating Response Rules.
These can trigger automated webhook alerts or even container quarantines. For example, if a new master node enters the cluster and the apiserver 1.1.1 benchmark fails, an automated webhook alert can be triggered to a Slack channel or an IT security case created.
Watch the on-demand webinar with an overview of Red Hat OpenShift security by Dave Meurer, Global Solutions Architect at Red Hat, and see a short demo of the new OpenShift benchmarks running in NeuVector below.
NeuVector is pleased to partner with the Red Hat OpenShift team to implement the automated running of these draft ‘CIS inspired’ benchmarks, and we will continue to work with Red Hat and the Center for Internet Security community as these benchmarks move to an officially approved status.
Please contact us if you’d like to schedule a private demo today.
Categories
- Container Security (74)
- Cloud Security (35)
- Docker Security (30)
- Kubernetes Security (26)
- Press Releases (21)
- Network Security (18)
- Container Threats (17)
- Articles (14)
- Kubernetes (13)
- Vulnerabilities (13)
- Container Networking (8)
- Container Firewall (7)
- Exploits (7)
- RedHat OpenShift (7)
- cloud-native security (7)
- AWS (6)
- Partnerships (6)
- Alerts (4)
- Ebooks + Guides (4)
- data loss prevention (4)
- security automation (4)
- service mesh (4)
- Cloud services (3)
- Compliance (3)
- Cyber Attacks (3)
- Kubernetes system (3)
- Microservices (3)
- NeuVector Product (3)
- Serverless (3)
- dlp (3)
- AWS ECS (2)
- CI/CD (2)
- CIS Benchmark (2)
- Customer Stories (2)
- Docker (2)
- Infrastructure as Code (2)
- Istio (2)
- Open Source (2)
- PCI Compliance (2)
- PCI-DSS (2)
- Slider Ebooks & Guides (2)
- Terraform (2)
- VMware (2)
- run-time (2)
- security mesh (2)
- shift left (2)
- waf (2)
- Alibaba (1)
- App Mesh (1)
- Backdoor (1)
- Banking (1)
- Black Duck Software (1)
- Docker Hub (1)
- Docker Networking (1)
- Docker container firewall (1)
- ECS (1)
- EKS (1)
- Events (1)
- Financial Services (1)
- GDPR (1)
- IBM Cloud (1)
- Internet of Things (1)
- JFrog (1)
- Jenkins (1)
- Knative (1)
- OpenShift (1)
- Secrets (1)
- VMware Photon (1)
- Virtual Patching (1)
- Webinar (1)
- admission control (1)
- application security (1)
- container risk score (1)
- cpu optimization (1)
- crypto (1)
- data breach (1)
- dpi (1)
- grafana (1)
- linkerd2 (1)
- micro-perimeter (1)
- monitoring (1)
- pci (1)
- prometheus (1)
- rancher (1)
- real-time containers (1)
- sdlc (1)
- sensitive data (1)