Safeguard your business

 

Deploy a flexible, layered IT security foundation using Red Hat and Google Cloud solutions

 

Security threats continue to grow

Modern business relies on IT services, applications, and operations. As a result, your IT infrastructure and data are now key business assets. Safeguarding them from threats is crucial, yet 32% of 
enterprises experienced major cyberattacks in the previous two years.

Organizations’ data and applications are frequent targets for cybercriminals. Vulnerabilities in your  IT infrastructure can have widespread, lasting, and catastrophic consequences for your business.

Understanding the current state of your IT security is the first step in improving your protection and response to threats. However, complex, disparate infrastructure often impedes visibility, preventing you from gaining a complete view of your environment.

 

Red Hat and Google Cloud provide a security-focused foundation 

Using an integrated approach to security, Red Hat and Google Cloud offer modular solutions that let you deploy a security-focused foundation based on Red Hat® Enterprise Linux® and Google 
Cloud. The flexibility of this foundation allows you to add components and capabilities as needed to meet your organization’s requirements at all times.

 

Increase protection at every level 

Red Hat and Google Cloud deliver security capabilities that work throughout your organization and infrastructure to increase security across data, application, infrastructure, and container layers.

Protect your data and applications with advanced security 

Red Hat and Google Cloud integrate advanced data and application security into their solution foundation.

Google Cloud’s infrastructure encrypts data at-rest by default. Google’s private global network provides fast and reliable connections to users around the world, encrypts data in-transit, protects against denial of service attacks, and insulates traffic from the public internet. Data exfiltration controls help to reduce the risk of insider threats.

Continuous integration/continuous deployment (CI/CD) technologies use built-in operational capabilities to create security-focused pipelines. Red Hat OpenShift® lets you define permissible external repositories, apply runtime security policies, and validate image signatures. Red Hat CodeReady Workspaces allows you to configure developer tools and Kubernetes-native workspaces for security and control access to centralized source code. Red Hat OpenShift Service Mesh lets developers easily integrate network security protocols without explicit coding.

Integrate security across your infrastructure

Red Hat and Google Cloud use a defense-in-depth approach that integrates security across all  aspects of your infrastructure—including hardware, operating platform, application services and 
deployment, identity management, and end devices.

Purpose-built processors, servers, storage, networks, and datacenters minimize complexity and attack surface. Live migration technology on Google Cloud allows servers to be updated, maintained, and restarted without disruption to services. Compliance with common regulatory frameworks ensures your infrastructure uses the latest security technologies and best practices.

Cryptographic verification of server software ensures all running software is legitimate. Built-in security features like SELinux in Red Hat Enterprise Linux are integrated throughout the entire software stack. Security scanning tools help you identify vulnerable configurations and systems that need patching. Automated configuration management and patching tools help you keep systems in compliance with security policies at all times. And fine-grained controls let you choose how to configure protections for your deployments running on Google Cloud infrastructure.

Deploy containers in a more secure way 

While containers can improve security, you must configure and manage them properly to experience these benefits. Take advantage of Red Hat and Google Cloud’s advanced container platforms and tools to ensure you deploy with integrated, state-of-the-art security standards.

Kubernetes-based orchestration combined with Red Hat OpenShift’s security context constraints (SCCs) let you manage and control containers and pods for maximum protection.  Role-based access control (RBAC) prevents unauthorized administrators from modifying configurations. Automatic host change logging and reversion capabilities help to maintain security settings.

Trusted, certified base images from Red Hat Container Catalog and Google Cloud let you deploy properly configured containers quickly and easily. Red Hat OpenShift includes daemon-less container tools for more secure builds and safer inspection, verification, signing, and shipment of container images and manifests. Binary authorization ensures that key staff members sign off on images before they go into production. Container image scanning, built on OpenSCAP with built-in security profiles to monitor regulatory compliance, keeps images up to date and in compliance with security policies. Check for missing advisories in a container image or assess security compliance against a baseline such as PCI-DSS.

 

Offering proven support and experience

With more than 15 years of experience in safeguarding data, the Google Cloud security model provides a foundation that protects your IT infrastructure, applications, and data. Together, Red Hat and Google Cloud offer security-focused solutions and provide support from a dedicated team of experts.