You could start out by reading the OpenShift Security Container Guide if you 
haven't already.

* https://docs.openshift.com/container-platform/latest/security/index.html 
<https://docs.openshift.com/container-platform/latest/security/index.html>

There was also this Tech N’ Talk briefing about security.

* 
https://blog.openshift.com/tech-n-talk-ten-layers-of-container-security-with-red-hats-kirsten-newcomer/
 
<https://blog.openshift.com/tech-n-talk-ten-layers-of-container-security-with-red-hats-kirsten-newcomer/>

There is a number of related links off that post as well.

Graham

> On 19 Nov 2017, at 8:09 am, Den Cowboy <[email protected]> wrote:
> 
> I would like to know the pro and cons of openshift in a production 
> environment from a security standpoint.
> I am used to the three-tier architecture or separation via VLAN 
> (presentation, Application, database), can you apply the same types of 
> controls in a containerized environment and more specifically in openshift. 
> If so how?
> _______________________________________________
> users mailing list
> [email protected] <mailto:[email protected]>
> http://lists.openshift.redhat.com/openshiftmm/listinfo/users 
> <http://lists.openshift.redhat.com/openshiftmm/listinfo/users>
_______________________________________________
users mailing list
[email protected]
http://lists.openshift.redhat.com/openshiftmm/listinfo/users

Reply via email to