SlideShare a Scribd company logo
Red Hat/CyberArk webinar
Jody Hunt
Director, DevOps Security
CyberArk
Vijay Arungurikai
Senior Solutions Architect
Embedded & ISV Partners, Red Hat
F16625-200131
The world’s leading provider
of open source enterprise IT solutions
2
*Red Hat client data and Fortune 500 list, October 2019.
Note: Currency in U.S. dollars.
MORE THAN
90%of the
FORTUNE
500
RED HAT
use
PRODUCTS &
SOLUTIONS*
~13,815
EMPLOYEES
105+
OFFICES
40+
COUNTRIES
THE FIRST
$3
OPEN
SOURCE
COMPANY
IN THE WORLD
BILLION
From communities to enterprise
3
44
Red Hat
Enterprise Linux
Red Hat
Virtualization
Red Hat
OpenStack Platform
Red Hat
Ceph Storage
Infrastructure Software
Container Platform
Red Hat
OpenShift Container Platform
Developer Tools
Automation &
Management
Red Hat
Ansible Automation
Platform
Red Hat
Satellite
Red Hat
Insights
Red Hat
CloudForms
Middleware & Integration
Red Hat
Fuse
Red Hat
Decision Manager
Red Hat
Process Automation Manager
Application & Business processes
Red Hat
JBoss EAP
Red Hat
AMQ
Red Hat
3Scale API Mgmt
Red Hat
OpenShift Application
Runtimes
Red Hat
CodeReady
Workspace
Services
Red Hat
Learning Subscription
Red Hat
Certification
Red Hat
Consulting
Red Hat
OPEN Innovation Labs
Product Portfolio
NEW INSTALLER
PLATFORMS
STORAGE
AUTOMATION
CLOUD-NATIVE
DEV TOOLS
RHV IPI
Azure & OpenStack UPI
DNS forwarding
Kubernetes 1.17
OpenShift Serverless is GA
Helm 3 support is GA
OpenShift Pipelines is TP
Developer Console gains
monitoring & Helm features
CSI topology support
CSI Volume snapshot,
restore, clone (Tech Preview)
iSCSI PVs for internal registry
Auto image pruning in registry
OpenShift 4.4
5
6
Developer Productivity
Cluster Services
Automated Ops ⠇Over-The-Air Updates ⠇Monitoring ⠇Registry ⠇Networking ⠇Router ⠇KubeVirt ⠇OLM ⠇Helm
Kubernetes
Developer CLI ⠇VS Code
extensions ⠇IDE Plugins
Code Ready Workspaces
CodeReady Containers
Service Mesh ⠇Serverless
Builds ⠇CI/CD Pipelines
Full Stack Logging
Chargeback
Databases ⠇Languages
Runtimes ⠇Integration
Business Automation
100+ ISV Services
Platform Services Application Services Developer Services
Physical Virtual Private cloud Public cloud
OpenShift
Kubernetes
Engine
Build Cloud-Native AppsManage Workloads
Multi-cluster Management
Discovery ⠇Policy ⠇Compliance ⠇Configuration ⠇Workloads
Advanced
Cluster
Management
OpenShift
Container
Platform
Managed cloud
(Azure, AWS, IBM, Red Hat)
Red Hat Enterprise Linux & RHEL CoreOS
OpenShift Container Platform
Automated
operations
A consistent container application platform
Multi-tenant
Network
traffic control
Over-the-air
updates
Bare metal, VMware vSphere, Red Hat Virtualization, Red Hat OpenStack Platform, Amazon
Web Services, Microsoft Azure, Google, IBM Cloud
Pluggable
architecture
Monitoring
& chargeback
Secure by default
FROM YOUR DATACENTER TO THE CLOUD
7
OpenShift enables developer productivity
SPRING & JAVA™ EE MICROSERVICES FUNCTIONS
LANGUAGES DATABASES APPLICATION SERVICES
LINUX WINDOWS*
* coming soon
CODE
BUILD TEST DEPLOY
MONITORREVIEW
Self-service
provisioning
Automated
build & deploy
CI/CD
pipelines
Consistent
environments
Configuration
management
App logs &
metrics
8
Full Stack Automation (IPI) Pre-existing Infrastructure (UPI)
Bare Metal
4.4 Supported Providers
IBM Power Systems
*
* Note: Planned for an upcoming 4.3.z release on April 30th
*
Denotes new addition in OCP 4.4
9
OpenShift offers the broadest set of hybrid cloud
services
Red Hat
OpenShift
Dedicated
Managed By Red Hat
or
Customer
Managed
or
Customer
Managed
Red Hat
OpenShift
Dedicated
Managed By Red Hat
or
Customer
Managed
Red Hat
OpenShift on
IBM Cloud
or
Customer
Managed (UPI)
Customer
Managed
On-premises
Azure Red Hat
OpenShift
Jointly Managed &
Supported Jointly Engineered
10
11
Red Hat OpenShift has seen 70%+ market expansion
Red Hat OpenShift customers
● Supported on every major cloud: AWS, Azure, GCP, IBM,
AliCloud
● Broadest hybrid cloud market adoption
● 100s of ISVs supporting operators
● Expanded AI/ML focus
● 1st to market with service mesh
● 1st to market with serverless
● New CodeReady developer experience
● New security, encryption enhancements
● Integrated IBM Portfolio via CloudPaks
● ...and much more
1700+
FY 2015 FY 2016 FY 2017 FY 2018 FY 2019 FY 2020
500
0
1000
1500
2000
12
A broad ecosystem of workloads
Operator-backed services allow for a
SaaS experience on your own infrastructure
Relational DBs
NoSQL DBs
Storage
Messaging
Security
Monitoring
AI/ML
Big Data
DevOps
Operator SDK
13
Enabling everybody to write Operators
Support for Helm 3
Build Operators from Helm
v2 and v3 charts
Ansible collections
Ansible Operator supports
k8s module collection
Custom metrics
Every Operator supports
custom metric endpoints
Generate Packaging
Operator Metadata (CSV) for
OLM gets generated
Kubernetes Compatibility
Keep in sync with new
Kubernetes releases
Scorecard v2
Enable testing your
Operator in a pipeline
Do your applications use
privileged credentials?
Secrets management for Red Hat OCP
Jody Hunt, DevOps SME
14
EVERYBODY WANTS A SECURE DEVOPS FLOW, BUT…
SHIFTING SECURITY LEFT INTO DEVELOPMENT WORKFLOWS
16
Developers
DevOps
Security
Empower Security Team
• Highlight the app & tool risk
• Leverage single platform –
human/non-human solution serves all
• Security focus
• Manage security budget
Enable Developer/DevOps
• Easy to use (consume secrets)
• Prebuilt integrations
• Open source and Secretless
Free developers from security burden
• Compliance, audit requests, human creds
• Security budget
Plan Code Create Test Release Deploy Operate
THE PROBLEM WE’RE SOLVING
There are lots of places to store secrets.
But:
• Platform solutions only work for
those platforms
• Tool solutions lack security
• Most not enterprise ready
• Hard to share best-practices
• SoD not enforced
• GRC reporting is impossible
Islands of Security
Hiera DatabagsVault
IAM / KMS IAM / KMS
Home Grown
Solutions
SecretsSecrets
IAM / KMS
THE VISION WE’RE DELIVERING ON
Enterprise-Spanning Service delivered by IT Security
IaaSOn-Prem Infrastructure and Apps
(*NIX, Windows, zOS)
DevOps ToolsPaaS
Security
Solutions
IT Mgt
Software
App Servers and
Custom Apps
RPA
PAS
Consistently enforce privilege security policies for both human users and non-human identities
CENTRAL AUDIT, SECURITY POLICY, SECRETS ROTATION
Application Access Manager
Consistent, Unified Enterprise-Wide
Privileged Access Security Program
CyberArk
Vault
Multi-Persona UI
Security
Admin
Developer
/DevOps
Admin
Threat Detection
and Analytics
Credential
Providers
–
Static Apps
Agent-based
Credential
Rotation
/Policy Driven
Monitoring
and Audit
Secrets
Management
–
Dynamic
Agentless
Dynamic Access Provider (Conjur Open Source)
OCP4 Lab Architecture
Linux Host
(Azure)
Windows Hosts
(my Mac)
CyberArk Enterprise
Password Vault
Synchronizer
OCP4 Cluster
(AWS)
User
Namespaces
Lab
App
Authen
-ticator
cybrlab
Namespace
ServiceService
SECRETS ACCESS WORKFLOW
Authenticate
Access Token
Requestor
Application Access Manager
Dynamic Access Provider
Targe
t
Access per Policy
Retrieve secrets
Use secrets
Access Token
expires after 8 mins
Audited
activity
• Lab 1:
• Authenticator runs as a Sidecar
• App pulls DB creds with REST API
• App connects to DB
• Lab 2: Secrets Injection
• Leverages Summon component
• Authenticator runs as an Init container
• Summon pulls DB creds & calls app w/ creds in env vars
• App connects to DB
• Lab 3: K8s Secrets
• Authenticator runs as an Init Container
• K8s secret manifest names DB cred names
• Authenticator retrieves DB creds & dynamically patches
K8s secret w/ DB cred values
• App connects to DB
• Lab 4: Secretless Broker
• Authenticator runs as a Sidecar Container listening on
DB port
• App attempts to connect to DB on local port
• Authenticator retrieves DB creds, connects to DB,
proxies connection for app
• App connects to DB
CYBERARK OCP4 LABS
THE SECRETS LIFECYCLE TODAY
Secrets Storage
Secrets Delivery
Application
s
• Monthly DevOps Workshops (Virtual)
• “CyberArk DevOps Workshop”
• July 16th
, 1pm Eastern
• https://www.cyberark.com/devops-workshops
• CyberArk Red Hat Integrations
• www.cyberark.com/redhat
• RedHat Ecosystem for CyberArk
• access.redhat.com/containers/#/vendor/cyberark
• CyberArk AAM documentation
• docs.cyberark.com
• lower right is Dynamic Access Provider
• Conjur Open Source Resources
• Open Source Secrets Management conjur.org
• Blog conjur.org/blog
• Developer Community cyberarkcommons.org
• Secretless Broker: conjur.org/Secretless
• Enterprise Resources
• Application Access Manager
• DevOps Security
EXPLORE SECRETS MANAGEMENT AND DEVOPS SECURITY :
24
linkedin.com/company/red-hat
youtube.com/user/RedHatVideos
facebook.com/redhatinc
twitter.com/RedHat
Red Hat is the world’s leading provider of
enterprise open source software solutions.
Award-winning support, training, and consulting
services make
Red Hat a trusted adviser to the Fortune 500.
Thank you

More Related Content

PDF
State of Mainframe DevOps
PDF
Modernizing on IBM Z Made Easier With Open Source Software
PDF
Securing DevOps Lifecycle
PDF
Application Asset Management with ThreadFix
PDF
Extending Jenkins to the Mainframe. A Simpler Approach.
PPTX
Static Application Security Testing Strategies for Automation and Continuous ...
PDF
Zero to 1000+ Applications - Large Scale CD Adoption at Cisco with Spinnaker ...
PPTX
Gartner EA Architecting for DevOps and Hybrid Cloud
State of Mainframe DevOps
Modernizing on IBM Z Made Easier With Open Source Software
Securing DevOps Lifecycle
Application Asset Management with ThreadFix
Extending Jenkins to the Mainframe. A Simpler Approach.
Static Application Security Testing Strategies for Automation and Continuous ...
Zero to 1000+ Applications - Large Scale CD Adoption at Cisco with Spinnaker ...
Gartner EA Architecting for DevOps and Hybrid Cloud

What's hot (20)

PDF
Running on Amazon EKS – How Greenlight Gets Security Right
PDF
Deliver your App Anywhere … Publicly or Privately
PPTX
Intro to android (gdays)
PPTX
Automate and Enhance Application Security Analysis
PPTX
Micro Focus Corporate Overview
PPTX
Troubleshooting the Most Common Citrix Complaints for Remote Workers
PDF
DevOps in the Real World: Know What it Takes to Make it Work
PDF
DevOps for Highly Regulated Environments
PPTX
Easily Create Scalable Automation using Selenium
PDF
Using Collaboration to Make Application Vulnerability Management a Team Sport
PDF
Webinar–The 2019 Open Source Year in Review
PPTX
Dev opscon survey summary 2013
PPTX
DevOps For Everyone: Bringing DevOps Success to Every App and Every Role in y...
PDF
Integrating SAP into DevOps Pipelines: Why and How
PPTX
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
PPTX
The Developer is the New CIO: How Vendors Adapt to the Changing Landscape
PDF
Managing Compliance in Container Environments
PDF
Dependency Health: Removing the Barriers to Keeping Projects in Shape
PDF
OWASP San Antonio Meeting 10/2/20
PDF
Spring Boot & Spring Cloud on Pivotal Application Service
Running on Amazon EKS – How Greenlight Gets Security Right
Deliver your App Anywhere … Publicly or Privately
Intro to android (gdays)
Automate and Enhance Application Security Analysis
Micro Focus Corporate Overview
Troubleshooting the Most Common Citrix Complaints for Remote Workers
DevOps in the Real World: Know What it Takes to Make it Work
DevOps for Highly Regulated Environments
Easily Create Scalable Automation using Selenium
Using Collaboration to Make Application Vulnerability Management a Team Sport
Webinar–The 2019 Open Source Year in Review
Dev opscon survey summary 2013
DevOps For Everyone: Bringing DevOps Success to Every App and Every Role in y...
Integrating SAP into DevOps Pipelines: Why and How
App-First & Cloud-Native: How InterMiles Boosted CX with AWS & Infostretch
The Developer is the New CIO: How Vendors Adapt to the Changing Landscape
Managing Compliance in Container Environments
Dependency Health: Removing the Barriers to Keeping Projects in Shape
OWASP San Antonio Meeting 10/2/20
Spring Boot & Spring Cloud on Pivotal Application Service
Ad

Similar to Securing Red Hat OpenShift Containerized Applications At Enterprise Scale (20)

PDF
Meetup Openshift Geneva 03/10
PPTX
FICO Open Shift presentation
PDF
Introduction to Red Hat OpenShift 4
PDF
OpenShift Meetup - Summit 2021 (Part 1)
PDF
Perth MeetUp November 2023
PDF
Veer's Container Security
PDF
Kubernetes 101 - an Introduction to Containers, Kubernetes, and OpenShift
PDF
Red Hat Container Strategy
PDF
Open shift deployment review getting ready for day 2 operations
PPTX
Dev ops
PDF
OpenShift Meetup 8th july 2019 at ConSol - OpenShift v4
PDF
OpenShift – the open-source PaaS by Marek Jelen
PDF
OpenShift PaaS Overviewi by Marek Jelen 03-2013 CodeMotion Roma
PDF
Build Your Own PaaS, Just like Red Hat's OpenShift from LinuxCon 2013 New Orl...
PDF
Red hat's updates on the cloud & infrastructure strategy
PDF
Red Hat OpenShift Container Platform Overview
PDF
Red Hat OpenShift -- Innovation without limitation.pdf
PDF
AWS Summit Singapore 2019 | Latest Trends for Cloud-Native Application Develo...
PDF
Openshift 3.10 & Container solutions for Blockchain, IoT and Data Science
PPTX
Red Hat Openshift Fundamentals.pptx
Meetup Openshift Geneva 03/10
FICO Open Shift presentation
Introduction to Red Hat OpenShift 4
OpenShift Meetup - Summit 2021 (Part 1)
Perth MeetUp November 2023
Veer's Container Security
Kubernetes 101 - an Introduction to Containers, Kubernetes, and OpenShift
Red Hat Container Strategy
Open shift deployment review getting ready for day 2 operations
Dev ops
OpenShift Meetup 8th july 2019 at ConSol - OpenShift v4
OpenShift – the open-source PaaS by Marek Jelen
OpenShift PaaS Overviewi by Marek Jelen 03-2013 CodeMotion Roma
Build Your Own PaaS, Just like Red Hat's OpenShift from LinuxCon 2013 New Orl...
Red hat's updates on the cloud & infrastructure strategy
Red Hat OpenShift Container Platform Overview
Red Hat OpenShift -- Innovation without limitation.pdf
AWS Summit Singapore 2019 | Latest Trends for Cloud-Native Application Develo...
Openshift 3.10 & Container solutions for Blockchain, IoT and Data Science
Red Hat Openshift Fundamentals.pptx
Ad

More from DevOps.com (20)

PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
PPTX
Vulnerability Discovery in the Cloud
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
PDF
A New Year’s Ransomware Resolution
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
PDF
Don't Panic! Effective Incident Response
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
PDF
Monitoring Serverless Applications with Datadog
PPTX
Securing medical apps in the age of covid final
PDF
How to Build a Healthy On-Call Culture
PPTX
The Evolving Role of the Developer in 2021
PDF
Service Mesh: Two Big Words But Do You Need It?
PPTX
Secure Data Sharing in OpenShift Environments
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
PDF
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
PDF
How IBM's Massive POWER9 UNIX Servers Benefit from InfluxDB and Grafana Techn...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Next Generation Vulnerability Assessment Using Datadog and Snyk
Vulnerability Discovery in the Cloud
2021 Open Source Governance: Top Ten Trends and Predictions
A New Year’s Ransomware Resolution
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Don't Panic! Effective Incident Response
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Monitoring Serverless Applications with Datadog
Securing medical apps in the age of covid final
How to Build a Healthy On-Call Culture
The Evolving Role of the Developer in 2021
Service Mesh: Two Big Words But Do You Need It?
Secure Data Sharing in OpenShift Environments
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
How IBM's Massive POWER9 UNIX Servers Benefit from InfluxDB and Grafana Techn...

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
A Presentation on Artificial Intelligence
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Cloud computing and distributed systems.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation theory and applications.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Approach and Philosophy of On baking technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
KodekX | Application Modernization Development
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Review of recent advances in non-invasive hemoglobin estimation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Network Security Unit 5.pdf for BCA BBA.
A Presentation on Artificial Intelligence
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Monthly Chronicles - July 2025
Cloud computing and distributed systems.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Reach Out and Touch Someone: Haptics and Empathic Computing
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation theory and applications.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Modernizing your data center with Dell and AMD
Approach and Philosophy of On baking technology
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Weekly Chronicles - August'25 Week I
KodekX | Application Modernization Development
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Review of recent advances in non-invasive hemoglobin estimation

Securing Red Hat OpenShift Containerized Applications At Enterprise Scale

  • 1. Red Hat/CyberArk webinar Jody Hunt Director, DevOps Security CyberArk Vijay Arungurikai Senior Solutions Architect Embedded & ISV Partners, Red Hat
  • 2. F16625-200131 The world’s leading provider of open source enterprise IT solutions 2 *Red Hat client data and Fortune 500 list, October 2019. Note: Currency in U.S. dollars. MORE THAN 90%of the FORTUNE 500 RED HAT use PRODUCTS & SOLUTIONS* ~13,815 EMPLOYEES 105+ OFFICES 40+ COUNTRIES THE FIRST $3 OPEN SOURCE COMPANY IN THE WORLD BILLION
  • 3. From communities to enterprise 3
  • 4. 44 Red Hat Enterprise Linux Red Hat Virtualization Red Hat OpenStack Platform Red Hat Ceph Storage Infrastructure Software Container Platform Red Hat OpenShift Container Platform Developer Tools Automation & Management Red Hat Ansible Automation Platform Red Hat Satellite Red Hat Insights Red Hat CloudForms Middleware & Integration Red Hat Fuse Red Hat Decision Manager Red Hat Process Automation Manager Application & Business processes Red Hat JBoss EAP Red Hat AMQ Red Hat 3Scale API Mgmt Red Hat OpenShift Application Runtimes Red Hat CodeReady Workspace Services Red Hat Learning Subscription Red Hat Certification Red Hat Consulting Red Hat OPEN Innovation Labs Product Portfolio
  • 5. NEW INSTALLER PLATFORMS STORAGE AUTOMATION CLOUD-NATIVE DEV TOOLS RHV IPI Azure & OpenStack UPI DNS forwarding Kubernetes 1.17 OpenShift Serverless is GA Helm 3 support is GA OpenShift Pipelines is TP Developer Console gains monitoring & Helm features CSI topology support CSI Volume snapshot, restore, clone (Tech Preview) iSCSI PVs for internal registry Auto image pruning in registry OpenShift 4.4 5
  • 6. 6 Developer Productivity Cluster Services Automated Ops ⠇Over-The-Air Updates ⠇Monitoring ⠇Registry ⠇Networking ⠇Router ⠇KubeVirt ⠇OLM ⠇Helm Kubernetes Developer CLI ⠇VS Code extensions ⠇IDE Plugins Code Ready Workspaces CodeReady Containers Service Mesh ⠇Serverless Builds ⠇CI/CD Pipelines Full Stack Logging Chargeback Databases ⠇Languages Runtimes ⠇Integration Business Automation 100+ ISV Services Platform Services Application Services Developer Services Physical Virtual Private cloud Public cloud OpenShift Kubernetes Engine Build Cloud-Native AppsManage Workloads Multi-cluster Management Discovery ⠇Policy ⠇Compliance ⠇Configuration ⠇Workloads Advanced Cluster Management OpenShift Container Platform Managed cloud (Azure, AWS, IBM, Red Hat) Red Hat Enterprise Linux & RHEL CoreOS OpenShift Container Platform
  • 7. Automated operations A consistent container application platform Multi-tenant Network traffic control Over-the-air updates Bare metal, VMware vSphere, Red Hat Virtualization, Red Hat OpenStack Platform, Amazon Web Services, Microsoft Azure, Google, IBM Cloud Pluggable architecture Monitoring & chargeback Secure by default FROM YOUR DATACENTER TO THE CLOUD 7
  • 8. OpenShift enables developer productivity SPRING & JAVA™ EE MICROSERVICES FUNCTIONS LANGUAGES DATABASES APPLICATION SERVICES LINUX WINDOWS* * coming soon CODE BUILD TEST DEPLOY MONITORREVIEW Self-service provisioning Automated build & deploy CI/CD pipelines Consistent environments Configuration management App logs & metrics 8
  • 9. Full Stack Automation (IPI) Pre-existing Infrastructure (UPI) Bare Metal 4.4 Supported Providers IBM Power Systems * * Note: Planned for an upcoming 4.3.z release on April 30th * Denotes new addition in OCP 4.4 9
  • 10. OpenShift offers the broadest set of hybrid cloud services Red Hat OpenShift Dedicated Managed By Red Hat or Customer Managed or Customer Managed Red Hat OpenShift Dedicated Managed By Red Hat or Customer Managed Red Hat OpenShift on IBM Cloud or Customer Managed (UPI) Customer Managed On-premises Azure Red Hat OpenShift Jointly Managed & Supported Jointly Engineered 10
  • 11. 11 Red Hat OpenShift has seen 70%+ market expansion Red Hat OpenShift customers ● Supported on every major cloud: AWS, Azure, GCP, IBM, AliCloud ● Broadest hybrid cloud market adoption ● 100s of ISVs supporting operators ● Expanded AI/ML focus ● 1st to market with service mesh ● 1st to market with serverless ● New CodeReady developer experience ● New security, encryption enhancements ● Integrated IBM Portfolio via CloudPaks ● ...and much more 1700+ FY 2015 FY 2016 FY 2017 FY 2018 FY 2019 FY 2020 500 0 1000 1500 2000
  • 12. 12 A broad ecosystem of workloads Operator-backed services allow for a SaaS experience on your own infrastructure Relational DBs NoSQL DBs Storage Messaging Security Monitoring AI/ML Big Data DevOps
  • 13. Operator SDK 13 Enabling everybody to write Operators Support for Helm 3 Build Operators from Helm v2 and v3 charts Ansible collections Ansible Operator supports k8s module collection Custom metrics Every Operator supports custom metric endpoints Generate Packaging Operator Metadata (CSV) for OLM gets generated Kubernetes Compatibility Keep in sync with new Kubernetes releases Scorecard v2 Enable testing your Operator in a pipeline
  • 14. Do your applications use privileged credentials? Secrets management for Red Hat OCP Jody Hunt, DevOps SME 14
  • 15. EVERYBODY WANTS A SECURE DEVOPS FLOW, BUT…
  • 16. SHIFTING SECURITY LEFT INTO DEVELOPMENT WORKFLOWS 16 Developers DevOps Security Empower Security Team • Highlight the app & tool risk • Leverage single platform – human/non-human solution serves all • Security focus • Manage security budget Enable Developer/DevOps • Easy to use (consume secrets) • Prebuilt integrations • Open source and Secretless Free developers from security burden • Compliance, audit requests, human creds • Security budget Plan Code Create Test Release Deploy Operate
  • 17. THE PROBLEM WE’RE SOLVING There are lots of places to store secrets. But: • Platform solutions only work for those platforms • Tool solutions lack security • Most not enterprise ready • Hard to share best-practices • SoD not enforced • GRC reporting is impossible Islands of Security Hiera DatabagsVault IAM / KMS IAM / KMS Home Grown Solutions SecretsSecrets IAM / KMS
  • 18. THE VISION WE’RE DELIVERING ON Enterprise-Spanning Service delivered by IT Security IaaSOn-Prem Infrastructure and Apps (*NIX, Windows, zOS) DevOps ToolsPaaS Security Solutions IT Mgt Software App Servers and Custom Apps RPA PAS Consistently enforce privilege security policies for both human users and non-human identities
  • 19. CENTRAL AUDIT, SECURITY POLICY, SECRETS ROTATION Application Access Manager Consistent, Unified Enterprise-Wide Privileged Access Security Program CyberArk Vault Multi-Persona UI Security Admin Developer /DevOps Admin Threat Detection and Analytics Credential Providers – Static Apps Agent-based Credential Rotation /Policy Driven Monitoring and Audit Secrets Management – Dynamic Agentless
  • 20. Dynamic Access Provider (Conjur Open Source) OCP4 Lab Architecture Linux Host (Azure) Windows Hosts (my Mac) CyberArk Enterprise Password Vault Synchronizer OCP4 Cluster (AWS) User Namespaces Lab App Authen -ticator cybrlab Namespace ServiceService
  • 21. SECRETS ACCESS WORKFLOW Authenticate Access Token Requestor Application Access Manager Dynamic Access Provider Targe t Access per Policy Retrieve secrets Use secrets Access Token expires after 8 mins Audited activity
  • 22. • Lab 1: • Authenticator runs as a Sidecar • App pulls DB creds with REST API • App connects to DB • Lab 2: Secrets Injection • Leverages Summon component • Authenticator runs as an Init container • Summon pulls DB creds & calls app w/ creds in env vars • App connects to DB • Lab 3: K8s Secrets • Authenticator runs as an Init Container • K8s secret manifest names DB cred names • Authenticator retrieves DB creds & dynamically patches K8s secret w/ DB cred values • App connects to DB • Lab 4: Secretless Broker • Authenticator runs as a Sidecar Container listening on DB port • App attempts to connect to DB on local port • Authenticator retrieves DB creds, connects to DB, proxies connection for app • App connects to DB CYBERARK OCP4 LABS
  • 23. THE SECRETS LIFECYCLE TODAY Secrets Storage Secrets Delivery Application s
  • 24. • Monthly DevOps Workshops (Virtual) • “CyberArk DevOps Workshop” • July 16th , 1pm Eastern • https://www.cyberark.com/devops-workshops • CyberArk Red Hat Integrations • www.cyberark.com/redhat • RedHat Ecosystem for CyberArk • access.redhat.com/containers/#/vendor/cyberark • CyberArk AAM documentation • docs.cyberark.com • lower right is Dynamic Access Provider • Conjur Open Source Resources • Open Source Secrets Management conjur.org • Blog conjur.org/blog • Developer Community cyberarkcommons.org • Secretless Broker: conjur.org/Secretless • Enterprise Resources • Application Access Manager • DevOps Security EXPLORE SECRETS MANAGEMENT AND DEVOPS SECURITY : 24
  • 25. linkedin.com/company/red-hat youtube.com/user/RedHatVideos facebook.com/redhatinc twitter.com/RedHat Red Hat is the world’s leading provider of enterprise open source software solutions. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. Thank you