Protect OpenShift containers
Red Hat OpenShift enables applications inside and outside Kubernetes clusters to run applications where it makes the most sense. OpenShift's basic security includes security hardening and FIPS (Federal Information Processing Standard) compliant encryption (FIPS 140-2 Level 1).
Once you have a secure foundation in place, adding Deep Security to your OpenShift deployment gives you access to Trend Micro’s extensive experience protecting physical, virtual, and cloud workloads as well as to real-time threat information from the Trend Micro Smart Protection Network. Deep Security both protects your deployment as well as helps meet and maintain continuous compliance requirements.
Deep Security protects your OpenShift hosts and containers running on Red Hat Linux distributions. Deep Security can do the following:
- Identify, find, and protect OpenShift hosts within your deployment
- Provide Enable and configure anti-malware for the file systems used on OpenShift hosts and within the containers
Communication between containers in the pod is not supported.
Deep Security protection for the OpenShift host
The following Deep Security modules can be used to protect the OpenShift host:
- Anti-Malware (excluding On-demand scan)
Deep Security protection for OpenShift containers
The following Deep Security modules can be used to protect OpenShift containers:
- Anti-Malware (excluding On-demand scan)