Summary
We have seen in this chapter some of the things you may consider to have secure OpenShift clusters. While OpenShift is considered a secure platform based on Kubernetes, how you manage it, of course, matters a lot. Consider establishing policies for access control, certificates, container and network isolation, development, and CI/CD pipelines.
A secure platform starts with proper planning to define and implement efficient policies to control what is being developed and deployed into the platform, protect it against unnecessary risks, and—finally—isolate workloads and networks as much as possible to mitigate the impacts that a breach could have on the environment. In Chapter 11, OpenShift Multi-Cluster GitOps and Management, you will see how to use Advanced Cluster Management to apply policies at scale to several clusters and make sure that all of them are compliant and safe, no matter where they are running.
In the next chapter, we will explore how to work...