YoVDO

Security-Oriented OpenShift Within Regulated Environments

Offered By: Red Hat via YouTube

Tags

Red Hat Summit Courses DevOps Courses OpenShift Courses Container Security Courses

Course Description

Overview

Explore how a major Central European bank implemented Red Hat OpenShift to modernize its delivery and deployment pipeline while meeting high security and regulatory standards in this 41-minute conference talk. Discover the bank's journey from legacy systems to containerization, including their evaluation of Docker Swarm and ultimate choice of OpenShift. Learn about real-world technical challenges and solutions for building secure pipelines, isolating containers, and controlling network traffic. Gain insights into implementing DevOps practices within a highly regulated environment, with practical examples of security scanning, traffic isolation, and network policing. Understand how to balance innovation with compliance requirements in a large-scale banking infrastructure modernization project.

Syllabus

Intro
Why are we here
About the bank
Challenges
Proofofconcept
Docker Swarm
Red Hat OpenShift
Problems
Goal
Problem
Short story
Security scanning report
Traffic isolation
Control outbound traffic
Control outgoing traffic
Network policing
Security Framework
DevOps


Taught by

Red Hat

Related Courses

Maintaining Deployment Security in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning
Securing Containers and Kubernetes Ecosystem
LinkedIn Learning
Performing DevSecOps Automated Security Testing
Pluralsight