You could start out by reading the OpenShift Security Container Guide if you haven't already.
* https://docs.openshift.com/container-platform/latest/security/index.html <https://docs.openshift.com/container-platform/latest/security/index.html> There was also this Tech N’ Talk briefing about security. * https://blog.openshift.com/tech-n-talk-ten-layers-of-container-security-with-red-hats-kirsten-newcomer/ <https://blog.openshift.com/tech-n-talk-ten-layers-of-container-security-with-red-hats-kirsten-newcomer/> There is a number of related links off that post as well. Graham > On 19 Nov 2017, at 8:09 am, Den Cowboy <[email protected]> wrote: > > I would like to know the pro and cons of openshift in a production > environment from a security standpoint. > I am used to the three-tier architecture or separation via VLAN > (presentation, Application, database), can you apply the same types of > controls in a containerized environment and more specifically in openshift. > If so how? > _______________________________________________ > users mailing list > [email protected] <mailto:[email protected]> > http://lists.openshift.redhat.com/openshiftmm/listinfo/users > <http://lists.openshift.redhat.com/openshiftmm/listinfo/users>
_______________________________________________ users mailing list [email protected] http://lists.openshift.redhat.com/openshiftmm/listinfo/users
