Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
OpenShift Multi-Cluster Management Handbook

You're reading from   OpenShift Multi-Cluster Management Handbook Go from architecture to pipelines using GitOps

Arrow left icon
Product type Paperback
Published in Nov 2022
Publisher Packt
ISBN-13 9781803235288
Length 458 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (2):
Arrow left icon
Rafael Pecora Rafael Pecora
Author Profile Icon Rafael Pecora
Rafael Pecora
Giovanni Fontana Giovanni Fontana
Author Profile Icon Giovanni Fontana
Giovanni Fontana
Arrow right icon
View More author details
Toc

Table of Contents (23) Chapters Close

Preface 1. Part 1 – Design Architectures for Red Hat OpenShift
2. Chapter 1: Hybrid Cloud Journey and Strategies FREE CHAPTER 3. Chapter 2: Architecture Overview and Definitions 4. Chapter 3: Multi-Tenant Considerations 5. Chapter 4: OpenShift Personas and Skillsets 6. Part 2 – Leverage Enterprise Products with Red Hat OpenShift
7. Chapter 5: OpenShift Deployment 8. Chapter 6: OpenShift Troubleshooting, Performance, and Best Practices 9. Chapter 7: OpenShift Network 10. Chapter 8: OpenShift Security 11. Part 3 – Multi-Cluster CI/CD on OpenShift Using GitOps
12. Chapter 9: OpenShift Pipelines – Tekton 13. Chapter 10: OpenShift GitOps – Argo CD 14. Chapter 11: OpenShift Multi-Cluster GitOps and Management 15. Part 4 – A Taste of Multi-Cluster Implementation and Security Compliance
16. Chapter 12: OpenShift Multi-Cluster Security 17. Chapter 13: OpenShift Plus – a Multi-Cluster Enterprise Ready Solution 18. Chapter 14: Building a Cloud-Native Use Case on a Hybrid Cloud Environment 19. Part 5 – Continuous Learning
20. Chapter 15: What’s Next 21. Index 22. Other Books You May Enjoy

OpenShift Security

Throughout this book, you have been able to follow some important aspects that involve processes, people, and all the technology involved to maintain a powerful, resilient, and fault-tolerant platform. A product of this magnitude with a vast structure, from its creation to customizations that will keep it fully functional, also requires a great division of responsibilities and skills for each step taken.

Security has always been and will always be a top concern in any enterprise, even more so now with the advent of things such as ransomware, malicious crypto-mining, malware, and other types of attacks. According to a Gartner study, by 2025, 90% of organizations that don’t control public cloud usage properly will inadvertently share sensitive data. When it comes to Kubernetes security, we also have seen a number of vulnerabilities and attacks recently. In the Further reading section of this chapter, you can check out some vulnerabilities and security incidents...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime