Slide 17
Slide 17 text
Red Hat to acquire StackRox
https://www.redhat.com/en/blog/how-red-hat-extending-kubernetes-native-security-across-open-hybrid-cloud-stackrox
https://www.redhat.com/en/blog/faq-red-hat-acquire-stackrox
Comprehensive visibility: deployments, network traffic, critical system-level events in each container, asset and inventory
tracking
Risk profiling of running deployments according to their security risk, correlation of image vulnerabilities deployments
Configuration management: application configuration analysis (Kube Linter); policies applied at build and deploy time
Compliance assessment across hundreds of controls for CIS Benchmarks, PCI, HIPAA, and NIST SP 800-190
Automated suggestion of network policy rules and simulation of the impact of network policy changes
Threat detection: detect anomalous activity, pre-built policies to detect crypto mining, privilege escalation, various exploits
Incidence response: alert on activity or kill impacted pods or containers; collect forensics data is collected and send to SIEM
Integration with DevOps systems through a rich API and pre-built plugins with CI/CD tools, image scanners, SIEMs, and
notification tools.