Overview What steps can we take to establish trust in our Software Supply Chain and ensure that our software can be traced back to its origin without introducing malicious code or dependencies? Moreover, how can we integrate Open Source tools to enhance the security of our Software Supply Chain’s lifecycle? As we explained in our […]
Tag: security
In the year 2023 we celebrate the 10th anniversary of Docker and the 9th anniversary of Kubernetes. Container technology has now become mainstream. But recent advances in the Podman ecosystem prove that innovation in the container world is still happening at a strong pace. Podman 4 was released in February 2022 and brought considerable improvements […]
A quick tour of how a Kubernetes Management Platform like Red Hat OpenShift can help to ease developers day to day work and ensure security at the same time
This blog kicks off a series of 4 blog articles. They will all be available here, as soon as they get published. Run: Get your Angular, Python or Java Dockerfile ready with Red Hat’s Universal Base Image and deploy with Helm on OpenShift Develop: The Inner Loop with OpenShift Dev Spaces Build: From upstream Tekton […]
First of all: What is a systemd service ? systemd is an init system in the Linux world, similar but not identical to init or SysVinit init systems (see [8]). There has been much discussion about this, but in the end all major distributions have for some time now switched to systemd. Essentially, systemd moves […]
Summary This article describes the installation of Red Hat Advanced Cluster Security (RHACS) using the Operator. It also covers the integration of Tekton Pipelines for the deployment of two different containers and the configuration of a Slack notification. A special feature here is that the installation and configuration is largely automated by scripts and can […]
Today more than ever availability and performance depend on resilience against increasingly frequent and powerful attacks on the confidentiality, availability and integrity of information and IT systems. It is not just that our systems are being threatened with continuous automated attacks, but also with highly sophisticated approaches, such as Advanced Persistent Threats (APTs), Ransomware, Side […]
For english content please see the blog post by Chris Jenkins at https://www.redhat.com/en/blog/openshift-security-hardening-healthcare-industry which essentially presents the same information as this post. Because of the importance of the topic and the ask from our german-language customers we wanted to also present this information in german. “Security is not a product, it itself is a process” […]
If the COVID-19 epidemic taught us one lesson, then it is how dependent we are on data exchange over the internet. Just think back to yourself, how did you pass by 2020/2021? How did you exchange data with service providers or your employer? How did you entertain yourself while being under lock down or how […]