Container Security

Critical Kubernetes & OpenShift Vulnerability Exposes API Server

The First Major Vulnerability Discovered in Kubernetes, And It’s A Big One The big news today on the eve of the start of DockerCon EMEA has not been conference related announcements but rather the disclosure of a critical security hole in Kubernetes, and by inheritance, Red Hat OpenShift. This vulnerability, CVE-2018-1002105, is so critical with… Read more »

Container Security

How to Automatically Scan Images Using OpenShift Image Streams

By Selvam Thangaraj The powerful capabilities enabled by OpenShift Image Streams is a welcome addition to the Red Hat OpenShift container platform. As more enterprises begin moving container workloads into production, the requirement to automate both the application management as well as the security tasks in their CI/CD pipeline becomes more critical. OpenShift Image Streams… Read more »

Container Security

OpenShift Security Automation

Containers and tools like Red Hat OpenShift enable enterprises to automate many aspects of application deployment, with many significant business benefits. But it’s easy to forget to automate the security aspects of containers. There are many built-in features for OpenShift security automation in the platform, but don’t stop there. Automating run-time security for OpenShift deployments… Read more »

Container Security

NeuVector Extends Red Hat OpenShift Availability with Role-Based Access Controls for Automated Run-time Container Security

The container firewall leader also adds Red Hat Container Registry scanning and a Jenkins plugin to automate vulnerability scanning during development SAN FRANCISCO – RED HAT SUMMIT – May 8, 2018 – NeuVector, the leader in Kubernetes security delivering the first and only multi-vector container firewall, today announced an expansion to its support for Red… Read more »

Container Security

How to Enforce DNS-based Egress Container Security Policies in Kubernetes and Openshift

By Gary Duan While more and more applications are moving to a microservices and container-based architecture, there are legacy applications that cannot be containerized. Access to these applications need to be secured with egress container security policies when containers are deployed with Kubernetes or Red Hat OpenShift. These legacy applications include database servers and applications… Read more »