Ten layers of container security (45 minutes session) | Breakout session
In this session, we'll identify the 10 most common layers in a typical container deployment, and the best ways to build security into each layer. These layers include: 1) container host: Multi-tenancy at the container layer, 2) content security container registries, and secure access to container images, 3) build process controlling what can be deployed with a cluster container platform authentication and authorization, 4) networking isolation, 5) attached storage API management, 6) endpoint security, 7) SSO roles, 8) access management in a cluster federation. Increasingly complicated applications and demands for faster development are putting even more pressure on infrastructure, IT teams, and processes. It's more important than ever to have the right technologies in place. Containers deliver00a0applications faster and scale them more rapidly. The advantages are numerous but can only be realized if the containers and their deployment include strong security. We'll dive into how to manage these security layers for yourself, or deploy a container platform that includes built-in security features. We'll use Red Hat00a0OpenShift Container Platform to illustrate how to deliver continuous security for containers.
Timothy Hunt
Senior Architect Red Hat
Timothy Hunt is a Senior Architect for the Red Hat Consulting Container Practice. He has worked with Red Hat’s OpenShift Container Platform since version 1. He has deep experience working with large enterprises to design and deploy OpenShift as well as assisting them in migrate workloads into containers.
Room 156C
Wednesday, 3rd May, 11:30 - 12:15