DevSecOps: Automating security in the development lifecycle
Learn how security teams are using DevOps principles and CI/CD pipelines to automate application security.
Automate application security with OpenShift Pipelines
In this self-paced tutorial, learn how to use OpenShift Pipelines to automate the deployment of your applications.
OpenShift Pipelines is a cloud-native, continuous integration and delivery (CI/CD) solution for building pipelines using Tekton. Tekton is a flexible, Kubernetes-native, open-source CI/CD framework that enables automating deployments across multiple platforms (e.g. Kubernetes, serverless, VMs, and so forth) by abstracting away the underlying details.
Learn DevSecOps
How DevSecOps brings security into the development process
Extend common DevOps tools and processes with DevSecOps to improve app...
Four reasons developers should use Ansible
Why should developers learn Ansible? Find out how this simple yet powerful...
Kubernetes admission control with validating webhooks
Learn to write, configure, and install a webhook that intercepts and...
DevSecOps is the way | Red Hat Livestreaming
In this monthly livestream series, learn how Red Hat weaves together DevOps and security automation to master DevSecOps. This show introduces you to Red Hat products used for DevSecOps and our security ecosystem partners to aid in your journey.
What developers need to know about security compliance
A developer's guide to security standards. Sharpen your understanding of key security standards and how they work together, then get tips for establishing responsibility for different aspects of your security infrastructure and incorporating security into your daily workflow—even when the requirements change from project to project.
Popular DevSecOps resources
Kubernetes configuration and security policies with KubeLinter | DevNation Tech Talk
Security and authentication strategies for apps on Kubernetes | DevNation Tech Talk
How to apply machine learning to GitOps
Improve deployment processes and outcomes by applying machine learning in...
Getting started with Tekton and Pipelines
Learn how to create a Kubernetes-native CI/CD pipeline by installing Tekton,...
3 steps toward improving container security
The basic steps of container security involve securing the build environment,...
Managing GitOps control planes for secure GitOps practices
Learn about the tools Red Hat has available to implement GitOps workflows....