Skip to contentRed Hat

Navigation

AI
  • Our approach

    • News and insights
    • Technical blog
    • Research
    • Live AI events
    • Explore AI at Red Hat
  • Our portfolio

    • Red Hat AI
    • Red Hat Enterprise Linux AI
    • Red Hat OpenShift AI
    • Red Hat AI Inference Server New
  • Engage & learn

    • AI learning hub
    • AI partners
    • Services for AI
Hybrid cloud
  • Use cases

    • Artificial intelligence

      Build, deploy, and monitor AI models and apps.

    • Linux standardization

      Get consistency across operating environments.

    • Application development

      Simplify the way you build, deploy, and manage apps.

    • Automation

      Scale automation and unite tech, teams, and environments.

    • Virtualization

      Modernize operations for virtualized and containerized workloads.

    • Security

      Code, build, deploy, and monitor security-focused software.

    • Edge computing

      Deploy workloads closer to the source with edge technology.

    • Explore solutions
  • Solutions by industry

    • Automotive
    • Financial services
    • Healthcare
    • Industrial sector
    • Media and entertainment
    • Public sector
    • Telecommunications

Discover cloud technologies

Learn how to use our cloud products and solutions at your own pace in the Red Hat® Hybrid Cloud Console.

Products
  • Platforms

    • Red Hat AI

      Develop and deploy AI solutions across the hybrid cloud.

    • Red Hat Enterprise Linux

      Support hybrid cloud innovation on a flexible operating system.

      New version
    • Red Hat OpenShift

      Build, modernize, and deploy apps at scale.

    • Red Hat Ansible Automation Platform

      Implement enterprise-wide automation.

  • Featured

    • Red Hat OpenShift Virtualization Engine
    • Red Hat OpenShift Service on AWS
    • Microsoft Azure Red Hat OpenShift
    • See all products
  • Try & buy

    • Start a trial
    • Buy online
    • Integrate with major cloud providers
  • Services & support

    • Consulting
    • Product support
    • Services for AI
    • Technical Account Management
    • Explore services
Training
  • Training & certification

    • Courses and exams
    • Certifications
    • Red Hat Academy
    • Learning community
    • Learning subscription
    • Explore training
  • Featured

    • Red Hat Certified System Administrator exam
    • Red Hat System Administration I
    • Red Hat Learning Subscription trial (No cost)
    • Red Hat Certified Engineer exam
    • Red Hat Certified OpenShift Administrator exam
  • Services

    • Consulting
    • Partner training
    • Product support
    • Services for AI
    • Technical Account Management
Learn
  • Build your skills

    • Documentation
    • Hands-on labs
    • Hybrid cloud learning hub
    • Interactive learning experiences
    • Training and certification
  • More ways to learn

    • Blog
    • Events and webinars
    • Podcasts and video series
    • Red Hat TV
    • Resource library

For developers

Discover resources and tools to help you build, deliver, and manage cloud-native applications and services.

Partners
  • For customers

    • Our partners
    • Red Hat Ecosystem Catalog
    • Find a partner
  • For partners

    • Partner Connect
    • Become a partner
    • Training
    • Support
    • Access the partner portal

Build solutions powered by trusted partners

Find solutions from our collaborative community of experts and technologies in the Red Hat® Ecosystem Catalog.

Search

I'd like to:

  • Start a trial
  • Manage subscriptions
  • See Red Hat jobs
  • Explore tech topics
  • Contact sales
  • Contact customer service

Help me find:

  • Documentation
  • Developer resources
  • Skills assessments
  • Architecture center
  • Security updates
  • Support cases

I want to learn more about:

  • AI
  • Application modernization
  • Automation
  • Cloud-native applications
  • Linux
  • Virtualization
ConsoleDocsSupportNew For you

Recommended

We'll recommend resources you may like as you browse. Try these suggestions for now.

  • Product trial center
  • Courses and exams
  • All products
  • Tech topics
  • Resource library
Log in

Sign in or create an account to get more from Red Hat

  • World-class support
  • Training resources
  • Product trials
  • Console access

A subscription may be required for some services.

Log in or register
Contact us
  • Home
  • Resources
  • How to automate DevSecOps in Red Hat OpenShift

How to automate DevSecOps in Red Hat OpenShift

March 21, 2022•
Resource type: E-book
Download PDF

How to automate DevSecOps in Red Hat OpenShift

Modern software delivery methods that embrace continuous deployments across hybrid environments require a new security approach—one that provides security guardrails earlier in the application development process, automates security assurance at each step, and transforms security into a business enabler.

Person standing and looking at information on a screen on the wall

Start with the software supply chain

Implementing DevSecOps starts with a “shift-left” approach to security that introduces security checks earlier in the development process to protect the software supply chain.

Content repository and storage

Private, internal registries often offer greater security capabilities.²

Choose a registry that offers advanced access control and built-in vulnerability scanning, such as Red Hat® Quay.

Trusted content

The base images used to build your containers are critical to security.

Look for a trusted and resilient, minimalist base image, such as Red Hat Universal Base Image.

CI build infrastructure

The security of your continuous integration (CI) build infrastructure is as important as your production environment. 

Implement security as code using continuous integration/continuous delivery (CI/CD) tools, such as Red Hat OpenShift® Pipelines and GitOps.

Limit administrative access and allow only required network ingress.

Most organizations are embracing DevSecOps for their hybrid environments

Do you have a DevSecOps initiative in your organization? ¹

26%

No—DevOps and security remain separate, with minimal collaboration

49%

Yes—It’s in an early stage, with DevOps and security collaborating on joint polices

25%

Yes—It’s in an advanced stage, where we’re integrating and automating security

Go beyond the software supply chain

Tools such as image scanners and registries can provide governance and detect vulnerabilities. However, reducing risk from misconfigurations (such as when your containers run with root privileges) and runtime incidents requires processes and best practices that operationalize DevSecOps across the full application life cycle.

Organizations experience security incidents across the build, deploy, and runtime phases. Implementing and automating DevSecOps provides developer-friendly guardrails that can decrease user error at build and deploy stages and protect workloads at runtime.

Red Hat graphic of floating cube, shield, numbers and screen

In the past 12 months, what security incidents or issues related to containers and/or Kubernetes have you experienced?¹

59%

Detected misconfiguration

32%

Security incident during runtime

31%

Major vulnerability to remediate

20%

Failed audit

6%

None

DevSecOps best practices for the full life cycle

Build stage

Catch issues early so they don’t become a blocker later in the development life cycle.

DevSecOps best pratices:

  • Use a trusted, enterprise-grade private image registry and limit access.
  • Use minimalist base images. 
  • Update outdated base images and their dependencies when new versions are available.
  • Remove exploitable and nonessential software like:
    • Package managers (apt, yum, apk). 
    • Network tools and clients (curl, wget, netcat). 
    • Unix shells, compilers, and debuggers.
  • Scan the image registry regularly for known operating system, application, and language vulnerabilities. 
  • Integrate image scanners with CI tools and build vulnerability awareness early, especially in the case of severe policy violations.
  • Don’t use secrets in a risky manner: 
    • Do not store secrets unencrypted. 
    • Do not use secrets as environmental variables.
    • Understand where and how secrets are being used to remove unnecessary exposure.
  • Break builds that exceed the security risk threshold, such as those that: 
    • Contain high severity, fixable vulnerabilities. 
    • Have not been scanned recently, or at all. 
    • Contain misconfigurations missed by a scanner, such as identity configurations or environment variables.

Deploy stage

Automate a DevSecOps feedback loop and remediation prioritization.

DevSecOps best pratices: 

  • Combine security-relevant data from the build stage with deployment configuration to determine the security risk of each deployment, including: 
    • Image vulnerabilities.
    • Access to secrets, storage, etc. 
    • Privileges and capabilities.
    • Workload isolation, network exposure, and blast radius. 
  • Use a secrets management tool to protect sensitive data.
  • Assess the privileges used by containers to keep it to a minimum viable set of capabilities. 
  • Avoid deployments without resource limits unless absolutely necessary. 
  • Annotate deployments with name, email alias, or Slack channel of the team responsible for the application. 
  • Block risky deployments and alert the correct team for automated and streamlined remediation.

Runtime stage

Prevent, detect, and contain runtime attacks.

DevSecOps best pratices: 

  • Implement dynamic scanning to detect vulnerabilities in running containers. 
  • Use behavioral baselining and process allow-listing to identify unusual runtime activity, such as: 
    • Privilege escalation.
    • Unauthorized network flows.
    • Cryptomining. 
    • Malicious process execution or other exploits.
  • Mitigate threats with Kubernetes-native controls: 
    • Scaling to zero.
    • Killing pods and restarting.

How Red Hat OpenShift Platform Plus helps automate DevSecOps

Red Hat OpenShift Platform Plus is a single hybrid cloud platform that helps enterprises build, deploy, run, manage, and provide security for innovative applications at scale. Multiple layers of security, manageability, and automation work across infrastructures and clouds to provide consistency throughout the software supply chain.

Key DevSecOps features

Enterprise-grade image registry 

Store, build, and deploy your container images in a private registry that provides built-in vulnerability scanning and enterprise authorization and authentication.

Secure-by-default base images 

Take advantage of the greater reliability, security, and performance with Red Hat Universal Base Image.

Full container life cycle vulnerability management 

Protect your images and running containers against known vulnerabilities based on specific language, package, or image layer, with streamlined remediation during build, deploy, and runtime.

Developer-friendly security guardrails

Shift security left with earlier security checks, and support developers with automated security monitoring that does not slow development or break workflows.

Enterprise-ready CI/CD pipelines with built-in security checks

Enforce application security policies by integrating them into the CI/CD pipeline, protect the software delivery pipeline from unauthorized access, and deliver actionable feedback to improve application security posture.

Risk-based prioritization

Deliver risk-based security analysis that collects and synthesizes data across software components, declarative configurations, and runtime activity.

Runtime threat detection and response

Protect workloads at runtime using prebuilt threat profiles and policies that help prevent or detect common threat vectors, such as unauthorized access, lateral movement, persistence, or resource hijacking.

Learn more

Red Hat OpenShift Platform Plus logo


Learn how Red Hat OpenShift Platform Plus can protect, manage, and provide security for your applications—across infrastructures and clouds.

Learn more
  1. Red Hat overview. “Kubernetes adoption, security, and market trends report 2021,” July 2021.

  2. ² Red Hat topic page. “What is a container registry?” Aug. 21, 2020.

Tags:Containers, Hybrid cloud, Security

Red Hat logoLinkedInYouTubeFacebookX

Products & portfolios

  • Red Hat AI
  • Red Hat Enterprise Linux
  • Red Hat OpenShift
  • Red Hat Ansible Automation Platform
  • Cloud services
  • See all products

Tools

  • Training and certification
  • My account
  • Customer support
  • Developer resources
  • Find a partner
  • Red Hat Ecosystem Catalog
  • Documentation

Try, buy, & sell

  • Product trial center
  • Red Hat Store
  • Buy online (Japan)
  • Console

Communicate

  • Contact sales
  • Contact customer service
  • Contact training
  • Social

About Red Hat

Red Hat is an open hybrid cloud technology leader, delivering a consistent, comprehensive foundation for transformative IT and artificial intelligence (AI) applications in the enterprise. As a trusted adviser to the Fortune 500, Red Hat offers cloud, developer, Linux, automation, and application platform technologies, as well as award-winning services.

  • Our company
  • How we work
  • Customer success stories
  • Analyst relations
  • Newsroom
  • Open source commitments
  • Our social impact
  • Jobs

Select a language

  • 简体中文
  • English
  • Français
  • Deutsch
  • Italiano
  • 日本語
  • 한국어
  • Português
  • Español

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility