{"id":2844,"date":"2023-09-21T10:53:00","date_gmt":"2023-09-21T08:53:00","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=2844"},"modified":"2024-07-11T07:29:13","modified_gmt":"2024-07-11T05:29:13","slug":"__trashed","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/__trashed\/","title":{"rendered":"Red Hat | CERTITUDE &#8211; OpenShift Security"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"776\" height=\"283\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/07\/2024_07_08_09_28_04_Wie_OpenShift_die_haufigsten_Kubernetes_Sicherheitslucken_adressiert_und_25_weit-1.png\" alt=\"\" class=\"wp-image-2845\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/07\/2024_07_08_09_28_04_Wie_OpenShift_die_haufigsten_Kubernetes_Sicherheitslucken_adressiert_und_25_weit-1.png 776w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/07\/2024_07_08_09_28_04_Wie_OpenShift_die_haufigsten_Kubernetes_Sicherheitslucken_adressiert_und_25_weit-1-300x109.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/07\/2024_07_08_09_28_04_Wie_OpenShift_die_haufigsten_Kubernetes_Sicherheitslucken_adressiert_und_25_weit-1-768x280.png 768w\" sizes=\"auto, (max-width: 776px) 100vw, 776px\" \/><\/figure>\n<\/div>\n\n\n<p>On September 21st 2023, Certitude and Red Hat jointly held a webinar on the topic of OpenShift security.<\/p>\n\n\n\n<p>In the webinar titled &#8220;Wie OpenShift die h\u00e4ufigsten Kubernetes-Sicherheitsl\u00fccken adressiert&#8221; (engl. &#8220;How OpenShift Addresses the Most Common Kubernetes Vulnerabilities&#8221;) Marc Nimmerrichter (Certitude Consulting GmbH) and Robert Baumgartner (Red Hat Austria GmbH) discussed the most common vulnerabilities in this technology, drawing on their many years of experience with Kubernetes. Additionally, a live demonstration showed how OpenShift addresses these vulnerabilities to provide a fundamentally secure platform for applications and infrastructure. The webinar covered numerous potential Kubernetes vulnerabilities, including container isolation, RBAC misconfigurations, and a live demo of kernel exploits. For each topic, theoretical foundations and practical countermeasures using OpenShift were discussed and demonstrated.<\/p>\n\n\n\n<p>If you missed the webinar or are hearing about it for the first time, you can access it on-demand for free via the <a href=\"https:\/\/events.redhat.com\/profile\/form\/index.cfm?PKformID=0x868510abcd\">following link<\/a>. Please note that the webinar is in German.<\/p>\n\n\n\n<p>Certitude thanks Red Hat for the excellent collaboration on this exciting topic and looks forward to future partnerships.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On September 21st 2023, Certitude and Red Hat jointly held a webinar on the topic of OpenShift security. In the webinar titled &#8220;Wie OpenShift die h\u00e4ufigsten Kubernetes-Sicherheitsl\u00fccken adressiert&#8221; (engl. &#8220;How OpenShift Addresses the Most Common Kubernetes Vulnerabilities&#8221;) Marc Nimmerrichter (Certitude Consulting GmbH) and Robert Baumgartner (Red Hat Austria GmbH) discussed the most common vulnerabilities in [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":2813,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[196],"tags":[563,556],"class_list":["post-2844","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-conferences","tag-k8s-en","tag-webinar"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=2844"}],"version-history":[{"count":4,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2844\/revisions"}],"predecessor-version":[{"id":2856,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2844\/revisions\/2856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/2813"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=2844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=2844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=2844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}