Table of contents

Protect OpenShift containers

Red Hat OpenShift enables applications inside and outside Kubernetes clusters to run applications where it makes the most sense. OpenShift's basic security includes security hardening and FIPS (Federal Information Processing Standard) compliant encryption (FIPS 140-2 Level 1).

Once you have a secure foundation in place, adding Workload Security to your OpenShift deployment gives you access to Trend Micro’s extensive experience protecting physical, virtual, and cloud workloads as well as to real-time threat information from the Trend Micro Smart Protection Network. Workload Security both protects your deployment as well as helps meet and maintain continuous compliance requirements.

Workload Security protects your OpenShift hosts and containers running on Red Hat Linux distributions. Workload Security can do the following:

  • Identify, find, and protect OpenShift hosts within your deployment
  • Provide real-time anti-malware detection for the file systems used on OpenShift hosts and within the containers

Communication between containers in the pod is not supported.

Workload Security protection for the OpenShift host

The following Workload Security modules can be used to protect the OpenShift host:

  • Anti-Malware (excluding On-demand scan)

Workload Security protection for OpenShift containers

The following Workload Security modules can be used to protect OpenShift containers:

  • Anti-Malware (excluding On-demand scan)

More OpenShift information