OpenShift Security
Throughout this book, you have been able to follow some important aspects that involve processes, people, and all the technology involved to maintain a powerful, resilient, and fault-tolerant platform. A product of this magnitude with a vast structure, from its creation to customizations that will keep it fully functional, also requires a great division of responsibilities and skills for each step taken.
Security has always been and will always be a top concern in any enterprise, even more so now with the advent of things such as ransomware, malicious crypto-mining, malware, and other types of attacks. According to a Gartner study, by 2025, 90% of organizations that don’t control public cloud usage properly will inadvertently share sensitive data. When it comes to Kubernetes security, we also have seen a number of vulnerabilities and attacks recently. In the Further reading section of this chapter, you can check out some vulnerabilities and security incidents...