Security
Headlines
HeadlinesLatestCVEs

Source

Red Hat Blog

Role-based access control for Red Hat Hybrid Cloud Console

Red Hat Hybrid Cloud Console uses role-based access controls (RBAC) to restrict network access to services and resources based on user roles.  Role permissions are either assigned or inherited through a role hierarchy and can be as broad—or granular—as needed, based on your requirements. Definitions and hierarchy  Before we delve further into RBAC, let's go over some basic terms:

Red Hat Blog
#vulnerability#red_hat#auth
Enhancing application container security and compliance with Podman

As organizations adopt container-based ecosystems, the approach to continuous IT security and compliance must shift from traditional system security assessments to new methodologies that account for how cloud-based technologies operate. Containers enable agnosticism amongst cloud computing operating environments by packaging applications, or workloads, within a virtualized environment.

The art and science of secure open source software development

For many, writing a computer program isn't that hard—it simply requires a certain amount of structural and logical thinking and a clear understanding of the syntax of the language you are using.

Shadow IT and shadow IoT

Can an IoT coffee maker leak company secrets? Where do you put the 'S' in 'IoT'? Join Alison Naylor, Senior Manager for Information Security at Red Hat, in this episode of Security Detail as she discusses the importance of securing IoT devices and how to proceed with caution.

Red Hat extends Common Vulnerabilities and Exposure Program expertise as newly-minted Root organization

When it comes to identifying potential security vulnerabilities in software, the technology industry has relied upon the Common Vulnerabilities and Exposure (CVE) system for more than two decades. Red Hat is a long-time contributor to this program, first helping the CVE system to work with the open source community and, more recently, serving as a CVE Naming Authority (CNA).

Getting started with Red Hat Insights malware detection

The beta of Red Hat Insights malware detection service is now available.

Streamlining IT security operations with Red Hat Insights and Red Hat Satellite

In this article, we explore what Red Hat Insights and Red Hat Satellite have to offer individually, and then we will look at how you can have a heightened experience of the two products with the use of Cloud Connector.

Implementing security benchmarks with Red Hat Ansible Automation Platform

This article is the first in a two-part series. Here we take a step back and look at the evolving IT security risk landscape and how it is impacting organizations, after which we'll look at a suggested automated compliance architecture.

I will take the Red (Hat) SLSA please: Introducing a framework for measuring supply chain security maturity

With the uptick in software supply chain attacks over the last couple of years, we have harnessed a particular focus on software supply chain security within our Product Security organization. The Open Source Security Foundation (OpenSSF), in collaboration with several companies including Red Hat, recently published version 0.1 of a new security framework targeted specifically for software supply chains aligned with SSDF—Supply chain Levels for Software Artifacts (SLSA).

Automated dynamic application security testing with RapiDAST and cross-team collaboration

Red Hat Product Security has been developing RapiDAST, a tool that can be used for security testing of products and services. DAST stands for dynamic application (or analysis) security testing. In this article, we introduce the tool and ideas that can help you with applying DAST into your software development life cycle.