Select Your Language

Infrastructure and Management

Cloud Computing

Storage

Runtimes

Integration and Automation

  • Comments
  • RHEL Atomic and security benchmarks

    Posted on

    We are actively investigating containers and everything they have to offer, and hopefully plan to start using them in the near future.

    One huge question that is glaring out for me is how are major organizations/agencies securing this? My organization is a CIS shop, and most anything getting deployed should be locked down to a CIS Benchmark, and we require routine scanning to make sure things are compliant.

    I think RHEL Atomic is great, but how am I suppose to pitch this to my security folks? I would be interested to see how other people and organizations got started using this technology, especially so with organizations that have a high standard of documentable and auditable security standards, like CIS or STIG.

    by

    points

    Responses

    Red Hat LinkedIn YouTube Facebook X, formerly Twitter

    Quick Links

    Help

    Site Info

    Related Sites

    © 2026 Red Hat