Table of contents
Topics on this page

Protect Red Hat OpenShift containers

Red Hat OpenShift's basic security includes hardening and Federal Information Processing Standard (FIPS) compliant encryption (FIPS 140-2 Level 1).

Once you have a secure foundation in place, adding Workload Security to your OpenShift deployment gives you access to Trend Micro’s protection of physical, virtual, and cloud workloads, as well as to real-time threat information from the Trend Micro Smart Protection Network. Workload Security not only protects your deployment, but also helps meet and maintain continuous compliance requirements.

Workload Security protects your OpenShift hosts and containers running on Red Hat Linux distributions by:

  • Identifying, finding, and protecting OpenShift hosts within your deployment.
  • Providing real-time anti-malware detection for the file systems used on OpenShift hosts and within the containers.

Communication between containers in the pod is not supported.

The Workload Security Anti-Malware module (excluding On-demand scan) can be used to protect the OpenShift host and containers.

For more information, see the following: