Wednesday, 3rd May

11:30 - 12:15
Ten layers of container security (45 minutes session) | Breakout session
In this session, we'll identify the 10 most common layers in a typical container deployment, and the best ways to build security into each layer. These layers include: 1) container host: Multi-tenancy at the container layer, 2) content security container registries, and secure access to container images, 3) build process controlling what can be deployed with a cluster container platform authentication and authorization, 4) networking isolation, 5) attached storage API management, 6) endpoint security, 7) SSO roles, 8) access management in a cluster federation. Increasingly complicated applications and demands for faster development are putting even more pressure on infrastructure, IT teams, and processes. It's more important than ever to have the right technologies in place. Containers deliver00a0applications faster and scale them more rapidly. The advantages are numerous but can only be realized if the containers and their deployment include strong security. We'll dive into how to manage these security layers for yourself, or deploy a container platform that includes built-in security features. We'll use Red Hat00a0OpenShift Container Platform to illustrate how to deliver continuous security for containers.