YoVDO

Network Security for Apps on OpenShift

Offered By: Red Hat via YouTube

Tags

Red Hat Summit Courses Network Security Courses OpenShift Courses Security Policies Courses Service Mesh Courses IPsec Courses

Course Description

Overview

Explore network security strategies for applications on OpenShift in this 53-minute Red Hat conference talk. Delve into crucial enterprise concerns about adopting container platforms in production, including securing application tiers, restricting external service connections, and safeguarding ingress. Examine various networking scenarios, system samples, and network security zones. Learn about separate cluster zones, egress management at project level, Egress Firewall implementation, and OpenShift Router configurations. Discover IP whitelisting techniques, Node Port approaches, and IPSec integration. Investigate application-level and Layer 7 security measures, and understand how service mesh enhances overall network security in OpenShift environments.

Syllabus

Introduction
Agenda
OpenSDM
Networking scenarios
System sample
Summary
Network security zones
Separate cluster zone
Other options
How does Egress happen
Project level Egress
Egress Firewall
OpenShift Router
IP Whitelisting
Node Port Approach
Type as External IP
IPSec
Application level
Layer 7 security
Network security
Service mesh
Security


Taught by

Red Hat

Related Courses

Fundamentals of Containers, Kubernetes, and Red Hat OpenShift
Red Hat via edX
Introduction to Containers, Kubernetes and OpenShift
IBM via edX
Introduction to Containers w/ Docker, Kubernetes & OpenShift
IBM via Coursera
Introducción a Contenedores con Docker y Kubernetes
IBM via Coursera
Conceptos Básicos de IBM Cloud
IBM via Coursera