Skip to contentRed Hat

Navigation

AI
  • Our approach

    • News and insights
    • Technical blog
    • Research
    • Live AI events
    • Explore AI at Red Hat
  • Our portfolio

    • Red Hat AI
    • Red Hat Enterprise Linux AI
    • Red Hat OpenShift AI
    • Red Hat AI Inference Server New
  • Engage & learn

    • AI learning hub
    • AI partners
    • Services for AI
Hybrid cloud
  • Use cases

    • Artificial intelligence

      Build, deploy, and monitor AI models and apps.

    • Linux standardization

      Get consistency across operating environments.

    • Application development

      Simplify the way you build, deploy, and manage apps.

    • Automation

      Scale automation and unite tech, teams, and environments.

    • Virtualization

      Modernize operations for virtualized and containerized workloads.

    • Security

      Code, build, deploy, and monitor security-focused software.

    • Edge computing

      Deploy workloads closer to the source with edge technology.

    • Explore solutions
  • Solutions by industry

    • Automotive
    • Financial services
    • Healthcare
    • Industrial sector
    • Media and entertainment
    • Public sector
    • Telecommunications

Discover cloud technologies

Learn how to use our cloud products and solutions at your own pace in the Red Hat® Hybrid Cloud Console.

Products
  • Platforms

    • Red Hat AI

      Develop and deploy AI solutions across the hybrid cloud.

    • Red Hat Enterprise Linux

      Support hybrid cloud innovation on a flexible operating system.

      New version
    • Red Hat OpenShift

      Build, modernize, and deploy apps at scale.

    • Red Hat Ansible Automation Platform

      Implement enterprise-wide automation.

  • Featured

    • Red Hat OpenShift Virtualization Engine
    • Red Hat OpenShift Service on AWS
    • Microsoft Azure Red Hat OpenShift
    • See all products
  • Try & buy

    • Start a trial
    • Buy online
    • Integrate with major cloud providers
  • Services & support

    • Consulting
    • Product support
    • Services for AI
    • Technical Account Management
    • Explore services
Training
  • Training & certification

    • Courses and exams
    • Certifications
    • Red Hat Academy
    • Learning community
    • Learning subscription
    • Explore training
  • Featured

    • Red Hat Certified System Administrator exam
    • Red Hat System Administration I
    • Red Hat Learning Subscription trial (No cost)
    • Red Hat Certified Engineer exam
    • Red Hat Certified OpenShift Administrator exam
  • Services

    • Consulting
    • Partner training
    • Product support
    • Services for AI
    • Technical Account Management
Learn
  • Build your skills

    • Documentation
    • Hands-on labs
    • Hybrid cloud learning hub
    • Interactive learning experiences
    • Training and certification
  • More ways to learn

    • Blog
    • Events and webinars
    • Podcasts and video series
    • Red Hat TV
    • Resource library

For developers

Discover resources and tools to help you build, deliver, and manage cloud-native applications and services.

Partners
  • For customers

    • Our partners
    • Red Hat Ecosystem Catalog
    • Find a partner
  • For partners

    • Partner Connect
    • Become a partner
    • Training
    • Support
    • Access the partner portal

Build solutions powered by trusted partners

Find solutions from our collaborative community of experts and technologies in the Red Hat® Ecosystem Catalog.

Search

I'd like to:

  • Start a trial
  • Manage subscriptions
  • See Red Hat jobs
  • Explore tech topics
  • Contact sales
  • Contact customer service

Help me find:

  • Documentation
  • Developer resources
  • Skills assessments
  • Architecture center
  • Security updates
  • Support cases

I want to learn more about:

  • AI
  • Application modernization
  • Automation
  • Cloud-native applications
  • Linux
  • Virtualization
ConsoleDocsSupportNew For you

Recommended

We'll recommend resources you may like as you browse. Try these suggestions for now.

  • Product trial center
  • Courses and exams
  • All products
  • Tech topics
  • Resource library
Log in

Sign in or create an account to get more from Red Hat

  • World-class support
  • Training resources
  • Product trials
  • Console access

A subscription may be required for some services.

Log in or register
Contact us
  • Home
  • Resources
  • How to deploy a comprehensive DevSecOps solution

How to deploy a comprehensive DevSecOps solution

July 29, 2021•
Resource type: Overview
Download PDF

Making DevOps secure is a complicated proposition

Securing DevOps is a complex undertaking because DevOps tools grow and change quickly. Containers and Kubernetes add more complexity and open up new attack vectors and security risks. Development and operations teams must make security an integral part of the entire application lifecycle to safeguard critical IT infrastructure, protect confidential data, and keep pace with change. 

Red Hat and our security ecosystem partners created a framework that provides a solid foundation and blueprint for delivering DevSecOps solutions that deploy and scale more efficiently. The Red Hat® DevSecOps framework addresses key security requirements throughout the DevOps life cycle as part of a comprehensive defense-in-depth security strategy. Red Hat and our security partners help you reduce risk by simplifying DevOps security and accelerating DevSecOps adoption. 

Security partners like Anchore, Aqua, CyberArk, Lacework, NeuVector, Palo Alto Networks, Portshift, Snyk, StackRox, Synopsys, Sysdig, Thales, Tigera, Trend Micro, and Tufin augment Red Hat native security capabilities, providing end-to-end DevSecOps solutions that improve your security posture and make the most of your Red Hat investments. 

Red Hat DevSecOps framework lays a solid foundation for a highly scalable, end-to-end DevSecOps solution.

Figure 1: DevSecOps framework

Complete framework addresses a range of security methods

The Red Hat DevSecOps framework identifies nine security categories and 32 methods and technologies that address the entire application life cycle. The framework places Red Hat built-in capabilities, DevOps toolchains, and security partner solutions at key integration points in the pipeline. You can implement some or all the methods and technologies within a category depending on the scope of your DevOps environment and your specific requirements. 

Kubernetes platform security

Securing your Kubernetes platform is fundamental. Preparing it to support business-critical applications in a secure, reliable, and scalable manner can be a challenge. In fact, deployment and management of Kubernetes continue to be the top two challenges for enterprises. Red Hat OpenShift® is an enterprise-ready Kubernetes container platform that eliminates complexity, removes adoption barriers, and includes a variety of built-in platform security features.

The Red Hat DevSecOps framework provides foundational features for securing the underlying container host (Red Hat Enterprise Linux® and Red Hat CoreOS) as well the container platform. Most Red Hat security features are enabled by default to simplify deployment and minimize risk. These features help you secure containers at their boundaries and protect the host from container escapes. 

Platform security methods

  • Host security: Provides mandatory access controls with SELinux, kernel facilities for controlling system calls with secure computing mode (seccomp), and kernel features for isolating CPU, memory, and other resources with CGroups.
  • Container platform security: Provides a lightweight container runtime with CRI-O and a secure container image registry with Quay.
  • Linux namespaces: Isolate applications across teams, groups, and departments.
  • Kubernetes and container hardening: Apply standards like NIST 800-190 and CIS Benchmarks.

Application analysis

Application analysis functions help you identify application vulnerabilities and other security issues early in the life cycle. By shifting security remaining from the DevOps lifecycle, you can identify and address vulnerabilities early and avoid repeated work later on.

Application analysis methods

  • Static application security testing (SAST): Analyzes code under development for vulnerabilities and quality issues. 
  • Software composition analysis (SCA): Examines dependent packages included with applications, looking for known vulnerabilities and licensing issues. 
  • Interactive application security testing (IAST) tools and dynamic application security testing (DAST) tools: Analyze running applications to find execution vulnerabilities. 

Application analysis also includes security methods like GitOps configuration management and container image risk management capabilities like malware, embedded secrets, and configuration defect detection functionality.

Identity and access management

Identity and access management (IAM) methods control access to on-premises and cloud assets, applications, and data based on user or application identity and administratively defined policies. They are found in every stage of the DevOps lifecycle and can help protect against unauthorized system access and lateral movement.

IAM methods

  • Authentication and authorization controls: Verify the identity of users and applications and grant them access to specific resources and functions. 
  • Role-based access controls (RBACs): Grant collections of users access to resources or functions based on their job responsibilities, simplify administration and onboarding, and reduce privilege creep. 
  • Identity providers, secrets vaults, and hardware security modules (HSMs): Manage and safeguard security credentials, keys, certificates, and secrets while at rest and in transit.

Additional IAM methods include container image provenance and image signing functions to validate container image authenticity and establish trust.

Compliance

Compliance methods and technologies help you adhere to industry and government regulations and corporate policies. They automate compliance validation and reporting throughout the DevOps pipeline, helping you simplify audits and avoid costly regulatory fines and lawsuits.

These methods improve compliance with a variety of data privacy and information security mandates, including:

  • Payment Card Industry Data Security Standard (PCI-DSS).
  • ISO 27001 information security management standard.
  • U.S. Health Insurance Portability and Accountability Act (HIPAA).
  • EU General Data Protection Regulation (GDPR).

Network controls and segmentation

Network controls and segmentation methods let you control, segregate, and visualize Kubernetes traffic. They help you isolate tenants and secure communications flows between containerized applications and microservices using a layered security approach.

Network controls and segmentation methods

  • Kubernetes network security policies: Control traffic flows at the IP address or port level and can be enhanced with cluster ingress and egress traffic controls, logging, and network visualization.
  • Software-defined networking (SDN): Provides a programmable, adaptable network fabric that is provisioned in real time to support dynamic security requirements and evolving business demands.
  • Service mesh: Provides network segmentation, network visualization, authentication, and authorization for containerized applications and microservices.

Data controls

Data control methods and technologies help protect data integrity and prevent unauthorized data disclosure. They protect data at rest and in motion, helping you safeguard intellectual property and confidential customer information.

Data control methods

  • Data encryption: Provides data cryptography, tokenization, data masking, and key management capabilities to help prevent unauthorized disclosure of data in databases, files, and containers.
  • Data protection: Discovers and classifies data and monitors and audits activity to help protect sensitive data and improve compliance.

Runtime analysis and protection

Production runtime methods help maintain cluster hygiene by identifying and mitigating suspicious and malicious activity in real-time.

Runtime analysis and protection methods

  • Admission controller: Functions as a Kubernetes gatekeeper that governs and enforces what is allowed to run on the cluster.
  • Runtime application behavioral analysis: Examines system activity and intelligently detects suspicious or malicious actions in real time. 
  • Runtime application self protection (RASP): Detects and blocks cyberattacks in real time.
  • API management: Controls access to APIs and secures API traffic.

Audit and monitoring

Audit and monitoring methods provide information about security incidents in your production environment. They describe when the event occured and provide probable cause and impact information, helping you improve visibility and accelerate incident response.

Audit and monitoring methods include:

  • Security information and event management (SIEM): Centralizes events reporting by consolidating logs and network flow data from distributed devices, endpoints, and applications. 
  • Forensics: Provides insights into security breaches, provides evidence to support compliance audits, and accelerates recovery efforts.

Remediation

Remediation methods automatically take corrective actions when security incidents occur in production. They help you improve uptime and avoid data loss.

Remediation methods

  • Security orchestration, automation and response (SOAR) platforms: Respond to security incidents by automating actions and integrating with other security tools. 
  • Root problem fix: Automatically resolves issues related to Kubernetes configuration errors and policy infractions. 

Conclusion

The Red Hat DevSecOps framework lays a reliable and scalable foundation to help you expand DevOps security and reduce risk. Red Hat and our security partners have the technology you need to simplify and accelerate your DevSecOps implementation. Contact us for more information.

Tags:Containers, DevOps, Partners, Security, Hybrid cloud

Red Hat logoLinkedInYouTubeFacebookX

Products & portfolios

  • Red Hat AI
  • Red Hat Enterprise Linux
  • Red Hat OpenShift
  • Red Hat Ansible Automation Platform
  • Cloud services
  • See all products

Tools

  • Training and certification
  • My account
  • Customer support
  • Developer resources
  • Find a partner
  • Red Hat Ecosystem Catalog
  • Documentation

Try, buy, & sell

  • Product trial center
  • Red Hat Store
  • Buy online (Japan)
  • Console

Communicate

  • Contact sales
  • Contact customer service
  • Contact training
  • Social

About Red Hat

Red Hat is an open hybrid cloud technology leader, delivering a consistent, comprehensive foundation for transformative IT and artificial intelligence (AI) applications in the enterprise. As a trusted adviser to the Fortune 500, Red Hat offers cloud, developer, Linux, automation, and application platform technologies, as well as award-winning services.

  • Our company
  • How we work
  • Customer success stories
  • Analyst relations
  • Newsroom
  • Open source commitments
  • Our social impact
  • Jobs

Select a language

  • 简体中文
  • English
  • Français
  • Deutsch
  • Italiano
  • 日本語
  • 한국어
  • Português
  • Español

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility