SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Red Hat/CyberArk webinar
Jody Hunt
Director, DevOps Security
CyberArk
Vijay Arungurikai
Senior Solutions Architect
Embedded & ISV Partners, Red Hat
F16625-200131
The world’s leading provider
of open source enterprise IT solutions
2
*Red Hat client data and Fortune 500 list, October 2019.
Note: Currency in U.S. dollars.
MORE THAN
90%of the
FORTUNE
500
RED HAT
use
PRODUCTS &
SOLUTIONS*
~13,815
EMPLOYEES
105+
OFFICES
40+
COUNTRIES
THE FIRST
$3
OPEN
SOURCE
COMPANY
IN THE WORLD
BILLION
From communities to enterprise
3
44
Red Hat
Enterprise Linux
Red Hat
Virtualization
Red Hat
OpenStack Platform
Red Hat
Ceph Storage
Infrastructure Software
Container Platform
Red Hat
OpenShift Container Platform
Developer Tools
Automation &
Management
Red Hat
Ansible Automation
Platform
Red Hat
Satellite
Red Hat
Insights
Red Hat
CloudForms
Middleware & Integration
Red Hat
Fuse
Red Hat
Decision Manager
Red Hat
Process Automation Manager
Application & Business processes
Red Hat
JBoss EAP
Red Hat
AMQ
Red Hat
3Scale API Mgmt
Red Hat
OpenShift Application
Runtimes
Red Hat
CodeReady
Workspace
Services
Red Hat
Learning Subscription
Red Hat
Certification
Red Hat
Consulting
Red Hat
OPEN Innovation Labs
Product Portfolio
NEW INSTALLER
PLATFORMS
STORAGE
AUTOMATION
CLOUD-NATIVE
DEV TOOLS
RHV IPI
Azure & OpenStack UPI
DNS forwarding
Kubernetes 1.17
OpenShift Serverless is GA
Helm 3 support is GA
OpenShift Pipelines is TP
Developer Console gains
monitoring & Helm features
CSI topology support
CSI Volume snapshot,
restore, clone (Tech Preview)
iSCSI PVs for internal registry
Auto image pruning in registry
OpenShift 4.4
5
6
Developer Productivity
Cluster Services
Automated Ops ⠇Over-The-Air Updates ⠇Monitoring ⠇Registry ⠇Networking ⠇Router ⠇KubeVirt ⠇OLM ⠇Helm
Kubernetes
Developer CLI ⠇VS Code
extensions ⠇IDE Plugins
Code Ready Workspaces
CodeReady Containers
Service Mesh ⠇Serverless
Builds ⠇CI/CD Pipelines
Full Stack Logging
Chargeback
Databases ⠇Languages
Runtimes ⠇Integration
Business Automation
100+ ISV Services
Platform Services Application Services Developer Services
Physical Virtual Private cloud Public cloud
OpenShift
Kubernetes
Engine
Build Cloud-Native AppsManage Workloads
Multi-cluster Management
Discovery ⠇Policy ⠇Compliance ⠇Configuration ⠇Workloads
Advanced
Cluster
Management
OpenShift
Container
Platform
Managed cloud
(Azure, AWS, IBM, Red Hat)
Red Hat Enterprise Linux & RHEL CoreOS
OpenShift Container Platform
Automated
operations
A consistent container application platform
Multi-tenant
Network
traffic control
Over-the-air
updates
Bare metal, VMware vSphere, Red Hat Virtualization, Red Hat OpenStack Platform, Amazon
Web Services, Microsoft Azure, Google, IBM Cloud
Pluggable
architecture
Monitoring
& chargeback
Secure by default
FROM YOUR DATACENTER TO THE CLOUD
7
OpenShift enables developer productivity
SPRING & JAVA™ EE MICROSERVICES FUNCTIONS
LANGUAGES DATABASES APPLICATION SERVICES
LINUX WINDOWS*
* coming soon
CODE
BUILD TEST DEPLOY
MONITORREVIEW
Self-service
provisioning
Automated
build & deploy
CI/CD
pipelines
Consistent
environments
Configuration
management
App logs &
metrics
8
Full Stack Automation (IPI) Pre-existing Infrastructure (UPI)
Bare Metal
4.4 Supported Providers
IBM Power Systems
*
* Note: Planned for an upcoming 4.3.z release on April 30th
*
Denotes new addition in OCP 4.4
9
OpenShift offers the broadest set of hybrid cloud
services
Red Hat
OpenShift
Dedicated
Managed By Red Hat
or
Customer
Managed
or
Customer
Managed
Red Hat
OpenShift
Dedicated
Managed By Red Hat
or
Customer
Managed
Red Hat
OpenShift on
IBM Cloud
or
Customer
Managed (UPI)
Customer
Managed
On-premises
Azure Red Hat
OpenShift
Jointly Managed &
Supported Jointly Engineered
10
11
Red Hat OpenShift has seen 70%+ market expansion
Red Hat OpenShift customers
● Supported on every major cloud: AWS, Azure, GCP, IBM,
AliCloud
● Broadest hybrid cloud market adoption
● 100s of ISVs supporting operators
● Expanded AI/ML focus
● 1st to market with service mesh
● 1st to market with serverless
● New CodeReady developer experience
● New security, encryption enhancements
● Integrated IBM Portfolio via CloudPaks
● ...and much more
1700+
FY 2015 FY 2016 FY 2017 FY 2018 FY 2019 FY 2020
500
0
1000
1500
2000
12
A broad ecosystem of workloads
Operator-backed services allow for a
SaaS experience on your own infrastructure
Relational DBs
NoSQL DBs
Storage
Messaging
Security
Monitoring
AI/ML
Big Data
DevOps
Operator SDK
13
Enabling everybody to write Operators
Support for Helm 3
Build Operators from Helm
v2 and v3 charts
Ansible collections
Ansible Operator supports
k8s module collection
Custom metrics
Every Operator supports
custom metric endpoints
Generate Packaging
Operator Metadata (CSV) for
OLM gets generated
Kubernetes Compatibility
Keep in sync with new
Kubernetes releases
Scorecard v2
Enable testing your
Operator in a pipeline
Do your applications use
privileged credentials?
Secrets management for Red Hat OCP
Jody Hunt, DevOps SME
14
EVERYBODY WANTS A SECURE DEVOPS FLOW, BUT…
SHIFTING SECURITY LEFT INTO DEVELOPMENT WORKFLOWS
16
Developers
DevOps
Security
Empower Security Team
• Highlight the app & tool risk
• Leverage single platform –
human/non-human solution serves all
• Security focus
• Manage security budget
Enable Developer/DevOps
• Easy to use (consume secrets)
• Prebuilt integrations
• Open source and Secretless
Free developers from security burden
• Compliance, audit requests, human creds
• Security budget
Plan Code Create Test Release Deploy Operate
THE PROBLEM WE’RE SOLVING
There are lots of places to store secrets.
But:
• Platform solutions only work for
those platforms
• Tool solutions lack security
• Most not enterprise ready
• Hard to share best-practices
• SoD not enforced
• GRC reporting is impossible
Islands of Security
Hiera DatabagsVault
IAM / KMS IAM / KMS
Home Grown
Solutions
SecretsSecrets
IAM / KMS
THE VISION WE’RE DELIVERING ON
Enterprise-Spanning Service delivered by IT Security
IaaSOn-Prem Infrastructure and Apps
(*NIX, Windows, zOS)
DevOps ToolsPaaS
Security
Solutions
IT Mgt
Software
App Servers and
Custom Apps
RPA
PAS
Consistently enforce privilege security policies for both human users and non-human identities
CENTRAL AUDIT, SECURITY POLICY, SECRETS ROTATION
Application Access Manager
Consistent, Unified Enterprise-Wide
Privileged Access Security Program
CyberArk
Vault
Multi-Persona UI
Security
Admin
Developer
/DevOps
Admin
Threat Detection
and Analytics
Credential
Providers
–
Static Apps
Agent-based
Credential
Rotation
/Policy Driven
Monitoring
and Audit
Secrets
Management
–
Dynamic
Agentless
Dynamic Access Provider (Conjur Open Source)
OCP4 Lab Architecture
Linux Host
(Azure)
Windows Hosts
(my Mac)
CyberArk Enterprise
Password Vault
Synchronizer
OCP4 Cluster
(AWS)
User
Namespaces
Lab
App
Authen
-ticator
cybrlab
Namespace
ServiceService
SECRETS ACCESS WORKFLOW
Authenticate
Access Token
Requestor
Application Access Manager
Dynamic Access Provider
Targe
t
Access per Policy
Retrieve secrets
Use secrets
Access Token
expires after 8 mins
Audited
activity
• Lab 1:
• Authenticator runs as a Sidecar
• App pulls DB creds with REST API
• App connects to DB
• Lab 2: Secrets Injection
• Leverages Summon component
• Authenticator runs as an Init container
• Summon pulls DB creds & calls app w/ creds in env vars
• App connects to DB
• Lab 3: K8s Secrets
• Authenticator runs as an Init Container
• K8s secret manifest names DB cred names
• Authenticator retrieves DB creds & dynamically patches
K8s secret w/ DB cred values
• App connects to DB
• Lab 4: Secretless Broker
• Authenticator runs as a Sidecar Container listening on
DB port
• App attempts to connect to DB on local port
• Authenticator retrieves DB creds, connects to DB,
proxies connection for app
• App connects to DB
CYBERARK OCP4 LABS
THE SECRETS LIFECYCLE TODAY
Secrets Storage
Secrets Delivery
Application
s
• Monthly DevOps Workshops (Virtual)
• “CyberArk DevOps Workshop”
• July 16th
, 1pm Eastern
• https://www.cyberark.com/devops-workshops
• CyberArk Red Hat Integrations
• www.cyberark.com/redhat
• RedHat Ecosystem for CyberArk
• access.redhat.com/containers/#/vendor/cyberark
• CyberArk AAM documentation
• docs.cyberark.com
• lower right is Dynamic Access Provider
• Conjur Open Source Resources
• Open Source Secrets Management conjur.org
• Blog conjur.org/blog
• Developer Community cyberarkcommons.org
• Secretless Broker: conjur.org/Secretless
• Enterprise Resources
• Application Access Manager
• DevOps Security
EXPLORE SECRETS MANAGEMENT AND DEVOPS SECURITY :
24
linkedin.com/company/red-hat
youtube.com/user/RedHatVideos
facebook.com/redhatinc
twitter.com/RedHat
Red Hat is the world’s leading provider of
enterprise open source software solutions.
Award-winning support, training, and consulting
services make
Red Hat a trusted adviser to the Fortune 500.
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

App-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & InfostretchApp-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
Infostretch
 
OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20
Denim Group
 

Was ist angesagt? (20)

Running on Amazon EKS – How Greenlight Gets Security Right
Running on Amazon EKS – How Greenlight Gets Security RightRunning on Amazon EKS – How Greenlight Gets Security Right
Running on Amazon EKS – How Greenlight Gets Security Right
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or Privately
 
Intro to android (gdays)
Intro to android (gdays)Intro to android (gdays)
Intro to android (gdays)
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate Overview
 
Troubleshooting the Most Common Citrix Complaints for Remote Workers
Troubleshooting the Most Common Citrix Complaints for Remote WorkersTroubleshooting the Most Common Citrix Complaints for Remote Workers
Troubleshooting the Most Common Citrix Complaints for Remote Workers
 
DevOps in the Real World: Know What it Takes to Make it Work
DevOps in the Real World: Know What it Takes to Make it WorkDevOps in the Real World: Know What it Takes to Make it Work
DevOps in the Real World: Know What it Takes to Make it Work
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
Easily Create Scalable Automation using Selenium
Easily Create Scalable Automation using SeleniumEasily Create Scalable Automation using Selenium
Easily Create Scalable Automation using Selenium
 
Using Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team SportUsing Collaboration to Make Application Vulnerability Management a Team Sport
Using Collaboration to Make Application Vulnerability Management a Team Sport
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
 
Dev opscon survey summary 2013
Dev opscon survey summary 2013Dev opscon survey summary 2013
Dev opscon survey summary 2013
 
DevOps For Everyone: Bringing DevOps Success to Every App and Every Role in y...
DevOps For Everyone: Bringing DevOps Success to Every App and Every Role in y...DevOps For Everyone: Bringing DevOps Success to Every App and Every Role in y...
DevOps For Everyone: Bringing DevOps Success to Every App and Every Role in y...
 
Integrating SAP into DevOps Pipelines: Why and How
Integrating SAP into DevOps Pipelines: Why and HowIntegrating SAP into DevOps Pipelines: Why and How
Integrating SAP into DevOps Pipelines: Why and How
 
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & InfostretchApp-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
 
The Developer is the New CIO: How Vendors Adapt to the Changing Landscape
The Developer is the New CIO: How Vendors Adapt to the Changing LandscapeThe Developer is the New CIO: How Vendors Adapt to the Changing Landscape
The Developer is the New CIO: How Vendors Adapt to the Changing Landscape
 
Managing Compliance in Container Environments
Managing Compliance in Container EnvironmentsManaging Compliance in Container Environments
Managing Compliance in Container Environments
 
Dependency Health: Removing the Barriers to Keeping Projects in Shape
Dependency Health: Removing the Barriers to Keeping Projects in ShapeDependency Health: Removing the Barriers to Keeping Projects in Shape
Dependency Health: Removing the Barriers to Keeping Projects in Shape
 
OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20OWASP San Antonio Meeting 10/2/20
OWASP San Antonio Meeting 10/2/20
 
Spring Boot & Spring Cloud on Pivotal Application Service
Spring Boot & Spring Cloud on Pivotal Application ServiceSpring Boot & Spring Cloud on Pivotal Application Service
Spring Boot & Spring Cloud on Pivotal Application Service
 

Ähnlich wie Securing Red Hat OpenShift Containerized Applications At Enterprise Scale

OpenStack + Cloud Foundry for the OpenStack Boston Meetup
OpenStack + Cloud Foundry for the OpenStack Boston MeetupOpenStack + Cloud Foundry for the OpenStack Boston Meetup
OpenStack + Cloud Foundry for the OpenStack Boston Meetup
ragss
 

Ähnlich wie Securing Red Hat OpenShift Containerized Applications At Enterprise Scale (20)

DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel AvivDevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
 
Red hat cloud platforms
Red hat cloud platformsRed hat cloud platforms
Red hat cloud platforms
 
JCON_15FactorWorkshop.pptx
JCON_15FactorWorkshop.pptxJCON_15FactorWorkshop.pptx
JCON_15FactorWorkshop.pptx
 
Red Hat Openshift on Microsoft Azure
Red Hat Openshift on Microsoft AzureRed Hat Openshift on Microsoft Azure
Red Hat Openshift on Microsoft Azure
 
Dev ops
Dev opsDev ops
Dev ops
 
IBM Open Cloud Update XCITE Fall 2014
IBM Open Cloud Update   XCITE Fall 2014IBM Open Cloud Update   XCITE Fall 2014
IBM Open Cloud Update XCITE Fall 2014
 
PaaS Anywhere - Deploying an OpenShift PaaS into your Cloud Provider of Choice
PaaS Anywhere - Deploying an OpenShift PaaS into your Cloud Provider of ChoicePaaS Anywhere - Deploying an OpenShift PaaS into your Cloud Provider of Choice
PaaS Anywhere - Deploying an OpenShift PaaS into your Cloud Provider of Choice
 
Cloud Foundry May 1 2014
Cloud Foundry May 1 2014Cloud Foundry May 1 2014
Cloud Foundry May 1 2014
 
Customize Your Enterprise Mobile Salesforce.com Integrations with Red Hat
Customize Your Enterprise Mobile Salesforce.com Integrations with Red HatCustomize Your Enterprise Mobile Salesforce.com Integrations with Red Hat
Customize Your Enterprise Mobile Salesforce.com Integrations with Red Hat
 
IBM Think 2020 Openshift on IBM Z and LinuxONE
IBM Think 2020 Openshift on IBM Z and LinuxONEIBM Think 2020 Openshift on IBM Z and LinuxONE
IBM Think 2020 Openshift on IBM Z and LinuxONE
 
Building Cloud Native Applications with Oracle Autonomous Database.
Building Cloud Native Applications with Oracle Autonomous Database.Building Cloud Native Applications with Oracle Autonomous Database.
Building Cloud Native Applications with Oracle Autonomous Database.
 
OpenStack + Cloud Foundry for the OpenStack Boston Meetup
OpenStack + Cloud Foundry for the OpenStack Boston MeetupOpenStack + Cloud Foundry for the OpenStack Boston Meetup
OpenStack + Cloud Foundry for the OpenStack Boston Meetup
 
.NET Cloud-Native Bootcamp
.NET Cloud-Native Bootcamp.NET Cloud-Native Bootcamp
.NET Cloud-Native Bootcamp
 
Agile Tour Pune 2015: Dev-ops- niche or mainstream: Bhaskar Venugopalan
Agile Tour Pune 2015: Dev-ops- niche or mainstream: Bhaskar VenugopalanAgile Tour Pune 2015: Dev-ops- niche or mainstream: Bhaskar Venugopalan
Agile Tour Pune 2015: Dev-ops- niche or mainstream: Bhaskar Venugopalan
 
Docker & aPaaS: Enterprise Innovation and Trends for 2015
Docker & aPaaS: Enterprise Innovation and Trends for 2015Docker & aPaaS: Enterprise Innovation and Trends for 2015
Docker & aPaaS: Enterprise Innovation and Trends for 2015
 
.NET Cloud-Native Bootcamp- Los Angeles
.NET Cloud-Native Bootcamp- Los Angeles.NET Cloud-Native Bootcamp- Los Angeles
.NET Cloud-Native Bootcamp- Los Angeles
 
Red Hat OpenShift Container Platform Overview
Red Hat OpenShift Container Platform OverviewRed Hat OpenShift Container Platform Overview
Red Hat OpenShift Container Platform Overview
 
D-DAY 2015 Hybrid Cloud IBM
D-DAY 2015 Hybrid Cloud IBMD-DAY 2015 Hybrid Cloud IBM
D-DAY 2015 Hybrid Cloud IBM
 
Putting Private Clouds to Work with PaaS Interop 2013 Vegas Diane Mueller
Putting Private Clouds to Work with PaaS Interop 2013 Vegas Diane MuellerPutting Private Clouds to Work with PaaS Interop 2013 Vegas Diane Mueller
Putting Private Clouds to Work with PaaS Interop 2013 Vegas Diane Mueller
 
Putting Private Clouds to Work with PaaS Interop Vegas 2013 presentation by D...
Putting Private Clouds to Work with PaaS Interop Vegas 2013 presentation by D...Putting Private Clouds to Work with PaaS Interop Vegas 2013 presentation by D...
Putting Private Clouds to Work with PaaS Interop Vegas 2013 presentation by D...
 

Mehr von DevOps.com

Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 

Mehr von DevOps.com (20)

Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and Snyk
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the Cloud
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident Response
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with Datadog
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call Culture
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
 
How IBM's Massive POWER9 UNIX Servers Benefit from InfluxDB and Grafana Techn...
How IBM's Massive POWER9 UNIX Servers Benefit from InfluxDB and Grafana Techn...How IBM's Massive POWER9 UNIX Servers Benefit from InfluxDB and Grafana Techn...
How IBM's Massive POWER9 UNIX Servers Benefit from InfluxDB and Grafana Techn...
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Securing Red Hat OpenShift Containerized Applications At Enterprise Scale

  • 1. Red Hat/CyberArk webinar Jody Hunt Director, DevOps Security CyberArk Vijay Arungurikai Senior Solutions Architect Embedded & ISV Partners, Red Hat
  • 2. F16625-200131 The world’s leading provider of open source enterprise IT solutions 2 *Red Hat client data and Fortune 500 list, October 2019. Note: Currency in U.S. dollars. MORE THAN 90%of the FORTUNE 500 RED HAT use PRODUCTS & SOLUTIONS* ~13,815 EMPLOYEES 105+ OFFICES 40+ COUNTRIES THE FIRST $3 OPEN SOURCE COMPANY IN THE WORLD BILLION
  • 3. From communities to enterprise 3
  • 4. 44 Red Hat Enterprise Linux Red Hat Virtualization Red Hat OpenStack Platform Red Hat Ceph Storage Infrastructure Software Container Platform Red Hat OpenShift Container Platform Developer Tools Automation & Management Red Hat Ansible Automation Platform Red Hat Satellite Red Hat Insights Red Hat CloudForms Middleware & Integration Red Hat Fuse Red Hat Decision Manager Red Hat Process Automation Manager Application & Business processes Red Hat JBoss EAP Red Hat AMQ Red Hat 3Scale API Mgmt Red Hat OpenShift Application Runtimes Red Hat CodeReady Workspace Services Red Hat Learning Subscription Red Hat Certification Red Hat Consulting Red Hat OPEN Innovation Labs Product Portfolio
  • 5. NEW INSTALLER PLATFORMS STORAGE AUTOMATION CLOUD-NATIVE DEV TOOLS RHV IPI Azure & OpenStack UPI DNS forwarding Kubernetes 1.17 OpenShift Serverless is GA Helm 3 support is GA OpenShift Pipelines is TP Developer Console gains monitoring & Helm features CSI topology support CSI Volume snapshot, restore, clone (Tech Preview) iSCSI PVs for internal registry Auto image pruning in registry OpenShift 4.4 5
  • 6. 6 Developer Productivity Cluster Services Automated Ops ⠇Over-The-Air Updates ⠇Monitoring ⠇Registry ⠇Networking ⠇Router ⠇KubeVirt ⠇OLM ⠇Helm Kubernetes Developer CLI ⠇VS Code extensions ⠇IDE Plugins Code Ready Workspaces CodeReady Containers Service Mesh ⠇Serverless Builds ⠇CI/CD Pipelines Full Stack Logging Chargeback Databases ⠇Languages Runtimes ⠇Integration Business Automation 100+ ISV Services Platform Services Application Services Developer Services Physical Virtual Private cloud Public cloud OpenShift Kubernetes Engine Build Cloud-Native AppsManage Workloads Multi-cluster Management Discovery ⠇Policy ⠇Compliance ⠇Configuration ⠇Workloads Advanced Cluster Management OpenShift Container Platform Managed cloud (Azure, AWS, IBM, Red Hat) Red Hat Enterprise Linux & RHEL CoreOS OpenShift Container Platform
  • 7. Automated operations A consistent container application platform Multi-tenant Network traffic control Over-the-air updates Bare metal, VMware vSphere, Red Hat Virtualization, Red Hat OpenStack Platform, Amazon Web Services, Microsoft Azure, Google, IBM Cloud Pluggable architecture Monitoring & chargeback Secure by default FROM YOUR DATACENTER TO THE CLOUD 7
  • 8. OpenShift enables developer productivity SPRING & JAVA™ EE MICROSERVICES FUNCTIONS LANGUAGES DATABASES APPLICATION SERVICES LINUX WINDOWS* * coming soon CODE BUILD TEST DEPLOY MONITORREVIEW Self-service provisioning Automated build & deploy CI/CD pipelines Consistent environments Configuration management App logs & metrics 8
  • 9. Full Stack Automation (IPI) Pre-existing Infrastructure (UPI) Bare Metal 4.4 Supported Providers IBM Power Systems * * Note: Planned for an upcoming 4.3.z release on April 30th * Denotes new addition in OCP 4.4 9
  • 10. OpenShift offers the broadest set of hybrid cloud services Red Hat OpenShift Dedicated Managed By Red Hat or Customer Managed or Customer Managed Red Hat OpenShift Dedicated Managed By Red Hat or Customer Managed Red Hat OpenShift on IBM Cloud or Customer Managed (UPI) Customer Managed On-premises Azure Red Hat OpenShift Jointly Managed & Supported Jointly Engineered 10
  • 11. 11 Red Hat OpenShift has seen 70%+ market expansion Red Hat OpenShift customers ● Supported on every major cloud: AWS, Azure, GCP, IBM, AliCloud ● Broadest hybrid cloud market adoption ● 100s of ISVs supporting operators ● Expanded AI/ML focus ● 1st to market with service mesh ● 1st to market with serverless ● New CodeReady developer experience ● New security, encryption enhancements ● Integrated IBM Portfolio via CloudPaks ● ...and much more 1700+ FY 2015 FY 2016 FY 2017 FY 2018 FY 2019 FY 2020 500 0 1000 1500 2000
  • 12. 12 A broad ecosystem of workloads Operator-backed services allow for a SaaS experience on your own infrastructure Relational DBs NoSQL DBs Storage Messaging Security Monitoring AI/ML Big Data DevOps
  • 13. Operator SDK 13 Enabling everybody to write Operators Support for Helm 3 Build Operators from Helm v2 and v3 charts Ansible collections Ansible Operator supports k8s module collection Custom metrics Every Operator supports custom metric endpoints Generate Packaging Operator Metadata (CSV) for OLM gets generated Kubernetes Compatibility Keep in sync with new Kubernetes releases Scorecard v2 Enable testing your Operator in a pipeline
  • 14. Do your applications use privileged credentials? Secrets management for Red Hat OCP Jody Hunt, DevOps SME 14
  • 15. EVERYBODY WANTS A SECURE DEVOPS FLOW, BUT…
  • 16. SHIFTING SECURITY LEFT INTO DEVELOPMENT WORKFLOWS 16 Developers DevOps Security Empower Security Team • Highlight the app & tool risk • Leverage single platform – human/non-human solution serves all • Security focus • Manage security budget Enable Developer/DevOps • Easy to use (consume secrets) • Prebuilt integrations • Open source and Secretless Free developers from security burden • Compliance, audit requests, human creds • Security budget Plan Code Create Test Release Deploy Operate
  • 17. THE PROBLEM WE’RE SOLVING There are lots of places to store secrets. But: • Platform solutions only work for those platforms • Tool solutions lack security • Most not enterprise ready • Hard to share best-practices • SoD not enforced • GRC reporting is impossible Islands of Security Hiera DatabagsVault IAM / KMS IAM / KMS Home Grown Solutions SecretsSecrets IAM / KMS
  • 18. THE VISION WE’RE DELIVERING ON Enterprise-Spanning Service delivered by IT Security IaaSOn-Prem Infrastructure and Apps (*NIX, Windows, zOS) DevOps ToolsPaaS Security Solutions IT Mgt Software App Servers and Custom Apps RPA PAS Consistently enforce privilege security policies for both human users and non-human identities
  • 19. CENTRAL AUDIT, SECURITY POLICY, SECRETS ROTATION Application Access Manager Consistent, Unified Enterprise-Wide Privileged Access Security Program CyberArk Vault Multi-Persona UI Security Admin Developer /DevOps Admin Threat Detection and Analytics Credential Providers – Static Apps Agent-based Credential Rotation /Policy Driven Monitoring and Audit Secrets Management – Dynamic Agentless
  • 20. Dynamic Access Provider (Conjur Open Source) OCP4 Lab Architecture Linux Host (Azure) Windows Hosts (my Mac) CyberArk Enterprise Password Vault Synchronizer OCP4 Cluster (AWS) User Namespaces Lab App Authen -ticator cybrlab Namespace ServiceService
  • 21. SECRETS ACCESS WORKFLOW Authenticate Access Token Requestor Application Access Manager Dynamic Access Provider Targe t Access per Policy Retrieve secrets Use secrets Access Token expires after 8 mins Audited activity
  • 22. • Lab 1: • Authenticator runs as a Sidecar • App pulls DB creds with REST API • App connects to DB • Lab 2: Secrets Injection • Leverages Summon component • Authenticator runs as an Init container • Summon pulls DB creds & calls app w/ creds in env vars • App connects to DB • Lab 3: K8s Secrets • Authenticator runs as an Init Container • K8s secret manifest names DB cred names • Authenticator retrieves DB creds & dynamically patches K8s secret w/ DB cred values • App connects to DB • Lab 4: Secretless Broker • Authenticator runs as a Sidecar Container listening on DB port • App attempts to connect to DB on local port • Authenticator retrieves DB creds, connects to DB, proxies connection for app • App connects to DB CYBERARK OCP4 LABS
  • 23. THE SECRETS LIFECYCLE TODAY Secrets Storage Secrets Delivery Application s
  • 24. • Monthly DevOps Workshops (Virtual) • “CyberArk DevOps Workshop” • July 16th , 1pm Eastern • https://www.cyberark.com/devops-workshops • CyberArk Red Hat Integrations • www.cyberark.com/redhat • RedHat Ecosystem for CyberArk • access.redhat.com/containers/#/vendor/cyberark • CyberArk AAM documentation • docs.cyberark.com • lower right is Dynamic Access Provider • Conjur Open Source Resources • Open Source Secrets Management conjur.org • Blog conjur.org/blog • Developer Community cyberarkcommons.org • Secretless Broker: conjur.org/Secretless • Enterprise Resources • Application Access Manager • DevOps Security EXPLORE SECRETS MANAGEMENT AND DEVOPS SECURITY : 24
  • 25. linkedin.com/company/red-hat youtube.com/user/RedHatVideos facebook.com/redhatinc twitter.com/RedHat Red Hat is the world’s leading provider of enterprise open source software solutions. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. Thank you