A zero-trust approach to Kubernetes infrastructure


In five years of running and supporting Kubernetes workloads in production, Red Hat has learned three very important lessons. First, defaults have inertia, meaning many of the settings used on day one will find their way into production. Second, reducing complexity is key to security. There are thousands of flag permutations to be set in Kubernetes. Studies show that most security breaches are tied to end-user configuration changes.1 Reducing cognitive overhead is critical to a good security practice. Finally, good ops is good security. When every machine is unique, the level of system complexity grows and increases the potential for human error. Once we reduce complexity, we can automate and scale. 

Red Hat has made a conscious effort to improve Red Hat® OpenShift® Container Platform in response to these lessons. This datasheet focuses on two important considerations, our approach to Federal Information Processing Standards (FIPS) validation and our strategic move to develop Red Hat Enterprise Linux® CoreOS


















By clicking 'Download Now' you agree to our Terms of Use. We take your privacy seriously. For more information please read our Privacy Policy. By registering with the Enterprise Guide you will automatically receive our weekly Product Update and Technology Insider eNewsletters.

Copyright 2021 Enterprise Guide. All Rights Reserved. Terms of Use | Privacy Policy