Join our office hours to learn how to go beyond image scanning and extend security to the deploy phase of OpenShift applications where workloads are configured.
We will show you how to:
- use access and authorization controls to protect your OpenShift clusters from unauthorized access
- reduce your attack surface and mitigate lateral movement by implementing workload isolation using network policies
- embed configuration checks into the build pipeline to shift security left
- take advantage of Kubernetes-native controls for better policy enforcement