Security

Article Thumbnail
Article

Managing Sensitive Assets Within Image Mode for Red Hat Enterprise Linux

Andrew Block

Aside from naming and versioning, managing sensitive assets, like credentials, is one of the more challenging aspects in technology. So, why is it so difficult? Well, to start off. What may be considered a sensitive asset to one individual or organization may not be the same as another. Also, given that there are so many different ways that sensitive assets can be managed, there is no universally accepted method available.
The challenges that encompass how sensitive assets are handled also apply to image mode, a new method that enables building and deploying Operating Systems using similar tools and approaches as any other traditional container. In this article, we will discuss the types of sensitive assets that apply to image mode for RHEL specifically and how to design appropriate workflows to incorporate secure practices within all phases, from build and deployment to runtime.

Page Thumbnail
Page

AI/ML Workloads

Applications based on machine learning and deep learning, using structured and unstructured data as the fuel to drive these applications.

Page Thumbnail
Page

Red Hat's AI/ML Platforms & Developer Tools

Red Hat provides AI/ML across its products and platforms, giving developers a portfolio of enterprise-class AI/ML solutions to deploy AI-enabled applications in any environment, increase efficiency, and accelerate time-to-value.

Red Hat Trusted Application Pipeline
Product

Red Hat Trusted Application Pipeline

Catch vulnerabilities early with a self-serve developer experience imbued with the organization’s security practices, for distributed teams to comply with security and compliance requirements. Development teams leverage solution templates with integrated security checks to standardize and expedite security-focused golden paths with Red Hat Trusted Application Pipeline. Remove toil in finding and fixing vulnerabilities early. Increase security posture in the CI/CD pipeline with an automated chain of trust that verifies compliance are met.

Red Hat Trusted Profile Analyzer
Product

Red Hat Trusted Profile Analyzer

Use your software assets with confidence. Curate your trusted content by eliminating vulnerabilities early during development, that reduces security risks and costly rework in production.