Best practices for securing the container life cycle

IT organizations are using container technology and DevOps processes to bring new-found agility to delivering applications that create business value. However, enterprise use requires strong security at every stage of the life cycle. Nothing is secure by default—security takes work. You need defense in depth. Red Hat delivers multiple layers of security controls throughout your applications, infrastructure, and processes to help you minimize security risks.

In this session, Red Hat’s Laurent Domb and Kirsten Newcomer will identify the 10 most common layers in a typical container deployment and deliver a deep-dive on best practices for securing containers through the CI/CD process, including verifying container provenance, creating security gates and policies, and managing updates to deployed containers.

  • Date:Thursday, May 10
  • Time:11:15 AM - 12:00 PM
  • Room:216
  • Location:Moscone South - 216
  • Session Type:Breakout
  • Session Code:S1049
  • Session Includes:Demo
  • Primary solution:Cloud computing
  • Products and Services:Red Hat CloudForms, Red Hat OpenShift Container Platform
  • Technical difficulty:Deep dive
  • Topic(s):Containers, DevOps, Security
  • Best for people who:Build applications, Design application/system architectures
  • Time slot:Morning