SlideShare a Scribd company logo
1 of 51
Download to read offline
ADD NAME (View > Master > Slide master)
Changing the Open Hybrid Cloud Game
Deploying OpenShift to Azure
Harold Wong
Cloud Architect
Commercial Software Engineering
harold.wong@microsoft.com
ADD NAME (View > Master > Slide master)
Red Hat OpenShift Container Platform
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
ADD NAME (View > Master > Slide master)
Accrediting OpenShift On Azure
Shawn Wells
Office of the Chief Technologist
U.S. Public Sector
shawn@redhat.com || 443-534-0130
31
March
โ€˜16
OpenShift on Azure
Reference
Architecture
May
โ€˜17
June
โ€˜17
OpenShift on Azure
FedRAMP Security
Blueprint
Microsoft & Red
Hat Government
Partnership
July
โ€˜17
Azure receives
FedRAMP High,
DoD Impact Level 4,
FBI CJIS certifications
RHEL7 + Containers
Common Criteria
Certification
Oct.
โ€˜16
32
Azure for Government Certifications
โ— Allows all DoD and mission
partners to leverage Azure
for โ€œControlled Unclassified
Informationโ€
โ— aka โ€œFOUOโ€
DoD Impact Level 4
ITAR Readiness
FedRAMP High
33
Azure for Government Certifications
โ— Store and process regulated
data.
โ— Azure facilities and
personnel US-based.
DoD Impact Level 4
ITAR Readiness
FedRAMP High
โ— Focus for today.
โ— GSA-estimated 50% of
$80B Federal IT budget falls
under โ€˜FedRAMP Highโ€™
34
Azure for Government Certifications
DoD Impact Level 4
ITAR Readiness
FedRAMP High
โ— RHEL 7.1 certified to
EAL4+.
โ— 3rd party lab verifies
security functionality.
โ— Certified multi-tenancy
capabilities.
35
Red Hat Certifications
Common Criteria
Test Suite
Code exercised by test
suite shows no unexpected
errors
Static Analysis Tools
All code is scanned and
important defects are
corrected
Independent 3rd Party
Code reviews are
performed and defects
corrected
Trained Programmers
The staff is trained and
follows procedures
Runtime Protections
The use of stack protector,
FORTIFY SOURCE,
RELRO, and kernel sysctls
are effective
Code Correctness
Discuss different classes of
errors and how they are
detected
Code Physically Secure
The code is kept in a SCC
system with access limited
to essential personnel
Prevention and Detection
Processes are in place, staff
trained, runtime defenses
mitigate latent problems
Coding Defects
There are no
implementation defects that
create vulnerabilities
36
RHEL meets
General Purpose Operating System
Protection Profile
Requirement Deficiencies
There are no missing
requirements
Design Deficiencies
There are no errors of
design that lead to
vulnerabilities
Operational Guidance
The security features are
well explained
Test Suite
Code exercised by test
suite shows no unexpected
errors
Static Analysis Tools
All code is scanned and
important defects are
corrected
Independent 3rd Party
Code reviews are
performed and defects
corrected
Trained Programmers
The staff is trained and
follows procedures
Runtime Protections
The use of stack protector,
FORTIFY SOURCE,
RELRO, and kernel sysctls
are effective
Code Correctness
Discuss different classes of
errors and how they are
detected
Code Physically Secure
The code is kept in a SCC
system with access limited
to essential personnel
Prevention and Detection
Processes are in place, staff
trained, runtime defenses
mitigate latent problems
Coding Defects
There are no
implementation defects that
create vulnerabilities
37
RHEL meets
General Purpose Operating System
Protection Profile
Requirement Deficiencies
There are no missing
requirements
Design Deficiencies
There are no errors of
design that lead to
vulnerabilities
Operational Guidance
The security features are
well explained
US Gov. Protection
Profiles
Test Suite
Code exercised by test
suite shows no unexpected
errors
Static Analysis Tools
All code is scanned and
important defects are
corrected
Independent 3rd Party
Code reviews are
performed and defects
corrected
Trained Programmers
The staff is trained and
follows procedures
Runtime Protections
The use of stack protector,
FORTIFY SOURCE,
RELRO, and kernel sysctls
are effective
Code Correctness
Discuss different classes of
errors and how they are
detected
Code Physically Secure
The code is kept in a SCC
system with access limited
to essential personnel
Prevention and Detection
Processes are in place, staff
trained, runtime defenses
mitigate latent problems
Coding Defects
There are no
implementation defects that
create vulnerabilities
38
RHEL meets
General Purpose Operating System
Protection Profile
Requirement Deficiencies
There are no missing
requirements
Design Deficiencies
There are no errors of
design that lead to
vulnerabilities
Operational Guidance
The security features are
well explained
FIPS 140-2
Cryptography Certification
Test Suite
Code exercised by test
suite shows no unexpected
errors
Static Analysis Tools
All code is scanned and
important defects are
corrected
Independent 3rd Party
Code reviews are
performed and defects
corrected
Trained Programmers
The staff is trained and
follows procedures
Runtime Protections
The use of stack protector,
FORTIFY SOURCE,
RELRO, and kernel sysctls
are effective
Code Correctness
Discuss different classes of
errors and how they are
detected
Code Physically Secure
The code is kept in a SCC
system with access limited
to essential personnel
Prevention and Detection
Processes are in place, staff
trained, runtime defenses
mitigate latent problems
Coding Defects
There are no
implementation defects that
create vulnerabilities
39
RHEL meets
General Purpose Operating System
Protection Profile
Requirement Deficiencies
There are no missing
requirements
Design Deficiencies
There are no errors of
design that lead to
vulnerabilities
Operational Guidance
The security features are
well explained
USGCB, STIGs
PUTTING IT TOGETHER:
OpenShift On Azure
Reference Architecture
+
Security Blueprint
41
OpenShift on Azure Reference Architecture
Provides a comprehensive, step-
by-step build of an enterprise
deployment of OpenShift v3.5
on Azure.
โ— Public documentation
โ— Automation scripts on
GitHub
42
43
44
OpenShift on Azure Security Blueprint
โ— ATO paperwork required for
all cloud systems
โ— We went through the
~300pg GSA SSP template
and pre-populated answers
45
OpenShift on Azure Security Blueprint
Some controls are implemented in whole or in part by Microsoft Azure
46
OpenShift on Azure Security Blueprint
Others are inherently met by use of Red Hat, e.g. FIPS for disk encryption
47
OpenShift on Azure Security Blueprint
For customer responsibilities, we documented what a successful response
would be:
48
49
50
*click*
THANK YOU

More Related Content

What's hot

MISRA Safety Case Guidelines -
MISRA Safety Case Guidelines - MISRA Safety Case Guidelines -
MISRA Safety Case Guidelines -
Automotive IQ
ย 
Standards for safety and security in avionics
Standards for safety and security in avionicsStandards for safety and security in avionics
Standards for safety and security in avionics
Alessandro Bruni
ย 
AppsSec In a DevOps World
AppsSec In a DevOps WorldAppsSec In a DevOps World
AppsSec In a DevOps World
Parasoft
ย 

What's hot (16)

FDA software compliance 2016
FDA software compliance 2016FDA software compliance 2016
FDA software compliance 2016
ย 
Driving Risks Out of Embedded Automotive Software
Driving Risks Out of Embedded Automotive SoftwareDriving Risks Out of Embedded Automotive Software
Driving Risks Out of Embedded Automotive Software
ย 
MISRA Safety Case Guidelines -
MISRA Safety Case Guidelines - MISRA Safety Case Guidelines -
MISRA Safety Case Guidelines -
ย 
Achieve iso 26262 certification
Achieve iso 26262 certificationAchieve iso 26262 certification
Achieve iso 26262 certification
ย 
Rx for FDA Software Compliance
Rx for FDA Software ComplianceRx for FDA Software Compliance
Rx for FDA Software Compliance
ย 
Standards for safety and security in avionics
Standards for safety and security in avionicsStandards for safety and security in avionics
Standards for safety and security in avionics
ย 
Unit testing : what are you missing for security
Unit testing : what are you missing for securityUnit testing : what are you missing for security
Unit testing : what are you missing for security
ย 
APIs Gone Wild - Star West 2013
APIs Gone Wild - Star West 2013APIs Gone Wild - Star West 2013
APIs Gone Wild - Star West 2013
ย 
AppsSec In a DevOps World
AppsSec In a DevOps WorldAppsSec In a DevOps World
AppsSec In a DevOps World
ย 
Deploy + Destroy Complete Test Environments
Deploy + Destroy Complete Test EnvironmentsDeploy + Destroy Complete Test Environments
Deploy + Destroy Complete Test Environments
ย 
ISO 26262 2nd Edition
ISO 26262 2nd EditionISO 26262 2nd Edition
ISO 26262 2nd Edition
ย 
Software Requirements for Safety-related Systems
Software Requirements for Safety-related SystemsSoftware Requirements for Safety-related Systems
Software Requirements for Safety-related Systems
ย 
Lessons from a recovering runtime application self protection addict
Lessons from a recovering runtime application self protection addictLessons from a recovering runtime application self protection addict
Lessons from a recovering runtime application self protection addict
ย 
Alien vault _policymanagement
Alien vault _policymanagementAlien vault _policymanagement
Alien vault _policymanagement
ย 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
ย 
Introducing: Klocwork Insight Pro | November 2009
Introducing: Klocwork Insight Pro | November 2009Introducing: Klocwork Insight Pro | November 2009
Introducing: Klocwork Insight Pro | November 2009
ย 

Similar to 2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift to Azure)

Kelly potvin nosurprises_odtug_oow12
Kelly potvin nosurprises_odtug_oow12Kelly potvin nosurprises_odtug_oow12
Kelly potvin nosurprises_odtug_oow12
Enkitec
ย 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
guest879f38
ย 
RUDDER - Continuous Configuration (configuration management + continuous aud...
 RUDDER - Continuous Configuration (configuration management + continuous aud... RUDDER - Continuous Configuration (configuration management + continuous aud...
RUDDER - Continuous Configuration (configuration management + continuous aud...
RUDDER
ย 

Similar to 2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift to Azure) (20)

The Magic Of Application Lifecycle Management In Vs Public
The Magic Of Application Lifecycle Management In Vs PublicThe Magic Of Application Lifecycle Management In Vs Public
The Magic Of Application Lifecycle Management In Vs Public
ย 
Kelly potvin nosurprises_odtug_oow12
Kelly potvin nosurprises_odtug_oow12Kelly potvin nosurprises_odtug_oow12
Kelly potvin nosurprises_odtug_oow12
ย 
powershell-is-dead-epic-learnings-london
powershell-is-dead-epic-learnings-londonpowershell-is-dead-epic-learnings-london
powershell-is-dead-epic-learnings-london
ย 
Microsoft Security Development Lifecycle
Microsoft Security Development LifecycleMicrosoft Security Development Lifecycle
Microsoft Security Development Lifecycle
ย 
Replay Solutions CFD
Replay Solutions CFDReplay Solutions CFD
Replay Solutions CFD
ย 
DevSecOps - automating security
DevSecOps - automating securityDevSecOps - automating security
DevSecOps - automating security
ย 
2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook2016 -11-18 OpenSCAP Workshop Coursebook
2016 -11-18 OpenSCAP Workshop Coursebook
ย 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline Security
ย 
Dev{sec}ops
Dev{sec}opsDev{sec}ops
Dev{sec}ops
ย 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
ย 
2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil
ย 
RUDDER - Continuous Configuration (configuration management + continuous aud...
 RUDDER - Continuous Configuration (configuration management + continuous aud... RUDDER - Continuous Configuration (configuration management + continuous aud...
RUDDER - Continuous Configuration (configuration management + continuous aud...
ย 
Azure presentation nnug dec 2010
Azure presentation nnug  dec 2010Azure presentation nnug  dec 2010
Azure presentation nnug dec 2010
ย 
Security Development Lifecycle Tools
Security Development Lifecycle ToolsSecurity Development Lifecycle Tools
Security Development Lifecycle Tools
ย 
Har du en DevOps i ditt team?
Har du en DevOps i ditt team?Har du en DevOps i ditt team?
Har du en DevOps i ditt team?
ย 
Application and Website Security -- Developer Edition: Introducing Security I...
Application and Website Security -- Developer Edition:Introducing Security I...Application and Website Security -- Developer Edition:Introducing Security I...
Application and Website Security -- Developer Edition: Introducing Security I...
ย 
Let's banish "it works on my machine"
Let's banish "it works on my machine"Let's banish "it works on my machine"
Let's banish "it works on my machine"
ย 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
ย 
Joomla! Day Chicago 2011 Presentation - Steven Pignataro
Joomla! Day Chicago 2011 Presentation - Steven PignataroJoomla! Day Chicago 2011 Presentation - Steven Pignataro
Joomla! Day Chicago 2011 Presentation - Steven Pignataro
ย 
Scale security for a dollar or less
Scale security for a dollar or lessScale security for a dollar or less
Scale security for a dollar or less
ย 

More from Shawn Wells

More from Shawn Wells (20)

2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms2017-10-10 AUSA 2017: Repeatable DCO Platforms
2017-10-10 AUSA 2017: Repeatable DCO Platforms
ย 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
ย 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02
ย 
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
2017-02-21 AFCEA West Building Continuous Integration & Deployment (CI/CD) Pi...
ย 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
ย 
2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security Update2016-08-18 Red Hat Partner Security Update
2016-08-18 Red Hat Partner Security Update
ย 
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain2015-11-15 - Supercomputing 2015 - Applied Cross Domain
2015-11-15 - Supercomputing 2015 - Applied Cross Domain
ย 
2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark2015-10-05 Fermilabs DevOps Alone in the Dark
2015-10-05 Fermilabs DevOps Alone in the Dark
ย 
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
2015 06-12 DevOpsDC 2015 - Consumer to Collaborator
ย 
2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks2015-01-27 ssa opening remarks
2015-01-27 ssa opening remarks
ย 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
ย 
2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap2014-07-31 customer convergence applied scap
2014-07-31 customer convergence applied scap
ย 
2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook2014-07-30 defense in depth scap workbook
2014-07-30 defense in depth scap workbook
ย 
2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing2014-05-08 IT Craftsmanship to IT Manufacturing
2014-05-08 IT Craftsmanship to IT Manufacturing
ย 
2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement2014-04-28 cloud security frameworks and enforcement
2014-04-28 cloud security frameworks and enforcement
ย 
2014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 20142014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 2014
ย 
2014 04-03 xyratex event
2014 04-03 xyratex event2014 04-03 xyratex event
2014 04-03 xyratex event
ย 
2013-08-22 NSA System Security & Management
2013-08-22 NSA System Security & Management2013-08-22 NSA System Security & Management
2013-08-22 NSA System Security & Management
ย 
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
2013-07-21 MITRE Developer Days - Red Hat SCAP Remediation
ย 
2013-06-12 Compliance Made Easy, Red Hat Summit 2013
2013-06-12 Compliance Made Easy, Red Hat Summit 20132013-06-12 Compliance Made Easy, Red Hat Summit 2013
2013-06-12 Compliance Made Easy, Red Hat Summit 2013
ย 

Recently uploaded

Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
SUHANI PANDEY
ย 
Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...
Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...
Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...
Chandigarh Call girls 9053900678 Call girls in Chandigarh
ย 
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
MOHANI PANDEY
ย 
celebrity ๐Ÿ’‹ Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Patna Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity ๐Ÿ’‹ Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Patna Escorts Just Dail 8250092165 service available anytime 24 hour
Call Girls in Nagpur High Profile
ย 
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
SUHANI PANDEY
ย 
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
SUHANI PANDEY
ย 
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
SUHANI PANDEY
ย 
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
Call Girls in Nagpur High Profile
ย 
celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
Call Girls in Nagpur High Profile
ย 

Recently uploaded (20)

Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
Pimple Gurav ) Call Girls Service Pune | 8005736733 Independent Escorts & Dat...
ย 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
ย 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
ย 
Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...
Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...
Russian๐ŸŒDazzling Hottie Getโ˜Ž๏ธ 9053900678 โ˜Ž๏ธcall girl In Chandigarh By Chandig...
ย 
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
ย 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
ย 
celebrity ๐Ÿ’‹ Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Patna Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity ๐Ÿ’‹ Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Patna Escorts Just Dail 8250092165 service available anytime 24 hour
ย 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
ย 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
ย 
SMART BANGLADESH I PPTX I SLIDE IShovan Prita Paul.pptx
SMART BANGLADESH  I    PPTX   I    SLIDE   IShovan Prita Paul.pptxSMART BANGLADESH  I    PPTX   I    SLIDE   IShovan Prita Paul.pptx
SMART BANGLADESH I PPTX I SLIDE IShovan Prita Paul.pptx
ย 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
ย 
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
ย 
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
ย 
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
ย 
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
ย 
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity ๐Ÿ’‹ Agra Escorts Just Dail 8250092165 service available anytime 24 hour
ย 
celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity ๐Ÿ’‹ Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
ย 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
ย 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
ย 

2017-07-11 GovLoop: Changing the Open Hybrid Cloud Game (Deploying OpenShift to Azure)

  • 1. ADD NAME (View > Master > Slide master) Changing the Open Hybrid Cloud Game Deploying OpenShift to Azure Harold Wong Cloud Architect Commercial Software Engineering harold.wong@microsoft.com
  • 2. ADD NAME (View > Master > Slide master) Red Hat OpenShift Container Platform
  • 3. ADD NAME (View > Master > Slide master)
  • 4. ADD NAME (View > Master > Slide master)
  • 5. ADD NAME (View > Master > Slide master)
  • 6. ADD NAME (View > Master > Slide master)
  • 7. ADD NAME (View > Master > Slide master)
  • 8. ADD NAME (View > Master > Slide master)
  • 9. ADD NAME (View > Master > Slide master)
  • 10. ADD NAME (View > Master > Slide master)
  • 11. ADD NAME (View > Master > Slide master)
  • 12. ADD NAME (View > Master > Slide master)
  • 13. ADD NAME (View > Master > Slide master)
  • 14. ADD NAME (View > Master > Slide master)
  • 15. ADD NAME (View > Master > Slide master)
  • 16. ADD NAME (View > Master > Slide master)
  • 17. ADD NAME (View > Master > Slide master)
  • 18. ADD NAME (View > Master > Slide master)
  • 19. ADD NAME (View > Master > Slide master)
  • 20. ADD NAME (View > Master > Slide master)
  • 21. ADD NAME (View > Master > Slide master)
  • 22. ADD NAME (View > Master > Slide master)
  • 23. ADD NAME (View > Master > Slide master)
  • 24. ADD NAME (View > Master > Slide master)
  • 25. ADD NAME (View > Master > Slide master)
  • 26. ADD NAME (View > Master > Slide master)
  • 27. ADD NAME (View > Master > Slide master)
  • 28. ADD NAME (View > Master > Slide master)
  • 29. ADD NAME (View > Master > Slide master)
  • 30. ADD NAME (View > Master > Slide master) Accrediting OpenShift On Azure Shawn Wells Office of the Chief Technologist U.S. Public Sector shawn@redhat.com || 443-534-0130
  • 31. 31 March โ€˜16 OpenShift on Azure Reference Architecture May โ€˜17 June โ€˜17 OpenShift on Azure FedRAMP Security Blueprint Microsoft & Red Hat Government Partnership July โ€˜17 Azure receives FedRAMP High, DoD Impact Level 4, FBI CJIS certifications RHEL7 + Containers Common Criteria Certification Oct. โ€˜16
  • 32. 32 Azure for Government Certifications โ— Allows all DoD and mission partners to leverage Azure for โ€œControlled Unclassified Informationโ€ โ— aka โ€œFOUOโ€ DoD Impact Level 4 ITAR Readiness FedRAMP High
  • 33. 33 Azure for Government Certifications โ— Store and process regulated data. โ— Azure facilities and personnel US-based. DoD Impact Level 4 ITAR Readiness FedRAMP High
  • 34. โ— Focus for today. โ— GSA-estimated 50% of $80B Federal IT budget falls under โ€˜FedRAMP Highโ€™ 34 Azure for Government Certifications DoD Impact Level 4 ITAR Readiness FedRAMP High
  • 35. โ— RHEL 7.1 certified to EAL4+. โ— 3rd party lab verifies security functionality. โ— Certified multi-tenancy capabilities. 35 Red Hat Certifications Common Criteria
  • 36. Test Suite Code exercised by test suite shows no unexpected errors Static Analysis Tools All code is scanned and important defects are corrected Independent 3rd Party Code reviews are performed and defects corrected Trained Programmers The staff is trained and follows procedures Runtime Protections The use of stack protector, FORTIFY SOURCE, RELRO, and kernel sysctls are effective Code Correctness Discuss different classes of errors and how they are detected Code Physically Secure The code is kept in a SCC system with access limited to essential personnel Prevention and Detection Processes are in place, staff trained, runtime defenses mitigate latent problems Coding Defects There are no implementation defects that create vulnerabilities 36 RHEL meets General Purpose Operating System Protection Profile Requirement Deficiencies There are no missing requirements Design Deficiencies There are no errors of design that lead to vulnerabilities Operational Guidance The security features are well explained
  • 37. Test Suite Code exercised by test suite shows no unexpected errors Static Analysis Tools All code is scanned and important defects are corrected Independent 3rd Party Code reviews are performed and defects corrected Trained Programmers The staff is trained and follows procedures Runtime Protections The use of stack protector, FORTIFY SOURCE, RELRO, and kernel sysctls are effective Code Correctness Discuss different classes of errors and how they are detected Code Physically Secure The code is kept in a SCC system with access limited to essential personnel Prevention and Detection Processes are in place, staff trained, runtime defenses mitigate latent problems Coding Defects There are no implementation defects that create vulnerabilities 37 RHEL meets General Purpose Operating System Protection Profile Requirement Deficiencies There are no missing requirements Design Deficiencies There are no errors of design that lead to vulnerabilities Operational Guidance The security features are well explained US Gov. Protection Profiles
  • 38. Test Suite Code exercised by test suite shows no unexpected errors Static Analysis Tools All code is scanned and important defects are corrected Independent 3rd Party Code reviews are performed and defects corrected Trained Programmers The staff is trained and follows procedures Runtime Protections The use of stack protector, FORTIFY SOURCE, RELRO, and kernel sysctls are effective Code Correctness Discuss different classes of errors and how they are detected Code Physically Secure The code is kept in a SCC system with access limited to essential personnel Prevention and Detection Processes are in place, staff trained, runtime defenses mitigate latent problems Coding Defects There are no implementation defects that create vulnerabilities 38 RHEL meets General Purpose Operating System Protection Profile Requirement Deficiencies There are no missing requirements Design Deficiencies There are no errors of design that lead to vulnerabilities Operational Guidance The security features are well explained FIPS 140-2 Cryptography Certification
  • 39. Test Suite Code exercised by test suite shows no unexpected errors Static Analysis Tools All code is scanned and important defects are corrected Independent 3rd Party Code reviews are performed and defects corrected Trained Programmers The staff is trained and follows procedures Runtime Protections The use of stack protector, FORTIFY SOURCE, RELRO, and kernel sysctls are effective Code Correctness Discuss different classes of errors and how they are detected Code Physically Secure The code is kept in a SCC system with access limited to essential personnel Prevention and Detection Processes are in place, staff trained, runtime defenses mitigate latent problems Coding Defects There are no implementation defects that create vulnerabilities 39 RHEL meets General Purpose Operating System Protection Profile Requirement Deficiencies There are no missing requirements Design Deficiencies There are no errors of design that lead to vulnerabilities Operational Guidance The security features are well explained USGCB, STIGs
  • 40. PUTTING IT TOGETHER: OpenShift On Azure Reference Architecture + Security Blueprint
  • 41. 41 OpenShift on Azure Reference Architecture Provides a comprehensive, step- by-step build of an enterprise deployment of OpenShift v3.5 on Azure. โ— Public documentation โ— Automation scripts on GitHub
  • 42. 42
  • 43. 43
  • 44. 44 OpenShift on Azure Security Blueprint โ— ATO paperwork required for all cloud systems โ— We went through the ~300pg GSA SSP template and pre-populated answers
  • 45. 45 OpenShift on Azure Security Blueprint Some controls are implemented in whole or in part by Microsoft Azure
  • 46. 46 OpenShift on Azure Security Blueprint Others are inherently met by use of Red Hat, e.g. FIPS for disk encryption
  • 47. 47 OpenShift on Azure Security Blueprint For customer responsibilities, we documented what a successful response would be:
  • 48. 48
  • 49. 49