May 23, 2022 By Stephen Dominguez 2 min read

IBM Systems Lab Services is excited to help you make sure your containers are secure with the new OpenShift Security Assessment.

Businesses are changing the architectural choices they are making in developing their applications. Instead of using traditional models, such as monolithic development, they are moving to microservices. The heart of microservices is the container — companies such as Netflix and Google are well known for how they have utilized and promoted the use of containers for their services.

If a business has developed an application with containers, then providing that application at significant scale will require container orchestration. Container orchestration provides automation for much of the operational effort required to run containerized applications.  Kubernetes is the well-known open-source container-orchestration system, and Red Hat OpenShift is a commercialized software product derived from Kubernetes. It contains additional features not available from the Kubernetes open-source project.

The OpenShift Security Assessment offering

The IBM OpenShift Security Assessment, offered by IBM Systems Lab Services, is a service that involves checking the security of your OpenShift settings by verifying that they are properly configured.

Security is a priority for any company, which is where an OpenShift Security Assessment is important. Once your company has deployed OpenShift, Lab Services experts verify security settings according to recommendations made by the Center for Internet Security’s (CIS) Red Hat OpenShift Container Platform v4 Benchmark. CIS’s OpenShift benchmark is inspired by the CIS Kubernetes benchmark.

The Lab Services OpenShift Security service lets you know how the deployment of one of your OpenShift clusters compares to the CIS OpenShift benchmark. An IBM expert will document and review with you what OpenShift settings are not configured securely. Most importantly, we help you understand the recommendations that indicate the presence of an increased security risk so that you can take decisive action to mitigate the identified risks.

Saving your organization time and money

It’s true that your organization could access the CIS OpenShift benchmark and assess the security of OpenShift on your own. However, that typically would require 80-120 person hours to accomplish. The OpenShift Security Assessment service only requires 1-4 hours of your time, because much of the work of the assessment is done by IBM in the background.

The following are some of the other benefits you’ll enjoy:

  • This service is free for eligible IBM Power clients: Those who are eligible can request this service at no cost via the Power to Cloud program.
  • Our analysis and interactions are user-friendly: We create a special Microsoft Word document and Excel spreadsheet that makes it easy to understand the extent of the items we are analyzing.
  • Our results are delivered by a technical expert: If you have specific questions that are related to OpenShift security (but not directly answered by the CIS OpenShift benchmark when discussing the testing results), our experts can research answers and follow up on additional items. The technical expert will work with you to ensure that everything is clearly understood.

Learn more

To learn more about how we can help you secure your orchestration platform, contact IBM Systems Lab Services at ibmsls@ibm.com.

Get more details about the IBM OpenShift Security Assessment, offered by IBM Systems Lab Services.

More from Security

Authentication vs. authorization: What’s the difference?

6 min read - Authentication and authorization are related but distinct processes in an organization’s identity and access management (IAM) system. Authentication verifies a user’s identity. Authorization gives the user the right level of access to system resources.  The authentication process relies on credentials, such as passwords or fingerprint scans, that users present to prove they are who they claim to be.  The authorization process relies on user permissions that outline what each user can do within a particular resource or network. For example,…

Top 7 risks to your identity security posture

5 min read - Detecting and remediating identity misconfigurations and blind spots is critical to an organization’s identity security posture especially as identity has become the new perimeter and a key pillar of an identity fabric. Let’s explore what identity blind spots and misconfigurations are, detail why finding them is essential, and lay out the top seven to avoid. What are the most critical risks to identity security? Identity misconfigurations and identity blind spots stand out as critical concerns that undermine an organization’s identity…

Intesa Sanpaolo and IBM secure digital transactions with fully homomorphic encryption

6 min read - This blog was made possible thanks to contributions from Nicola Bertoli, Sandra Grazia Tedesco, Alessio Di Michelangeli, Omri Soceanu, Akram Bitar, Allon Adir, Salvatore Sollami and Liam Chambers. Intesa Sanpaolo is one of the most trusted and profitable European banks. It offers commercial banking, corporate investment banking, asset management and insurance services. It is the leading bank in Italy with approximately 12 million customers served through its digital and traditional channels. The Cybersecurity Lab of Intesa Sanpaolo (ISP) needed to…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters