Solution Architect Chris Porter identifies how Red Hat Advanced Cluster Security provides enforcement of security rules in several ways that depend on the policy lifecycle. This is a demonstration of what happens when policies are set to enforce at Build, Deploy, and Runtime lifecycles.
Helpful Links:
Got an idea for our next video? We’d love to hear it! Submit here: https://red.ht/40gVilq
Experience ACS for yourself – Try it FREE for 60 days: https://www.redhat.com/en/technologies/cloud-computing/openshift/advanced-cluster-security-kubernetes/cloud-service/trial
For more details, visit our open documentation and code: https://docs.openshift.com/acs/4.2/welcome/index.html
Chapters:
00:00 – Intro
01:30 – Policy management
04:00 – roxctl command line interface (CLI)
06:10 – CI/CD integration
07:40 – log4shel policy example
09:40 – Command line example
12:00 – Runtime policies
16:00 – Runtime enforcement
Join us in this series as our product specialists unveil critical insights and strategies to shield and optimize your applications using ACS, which are aligned with the latest security trends. Stay ahead in the security game with ACS!
Your feedback shapes our content! Share your thoughts and ideas for future videos.
#AdvancedClusterSecurity #ACSSnapshots #CyberSecurity #RedHat #OpenShift #ChrisPorter #SecurityBestPractices #vulnerabilitymanagement #PolicyManagement