Signed Images from the Red Hat Container Catalog

As a follow-up to my introduction of simple signing, I’m excited to announce that Red Hat is now serving signatures for Red Hat Container Catalog Images!

In May, Red Hat announced the Container Health Index, providing an aggregate safety rating for container images in our public registry. As part of our commitment to delivering trusted content, we are now serving signed images. This means that customers can now configure a Red Hat Enterprise Linux host to cryptographically verify that images have come from Red Hat when they are pulled onto the system. This is a significant step in advancing the security of container hosts, providing assurance of provenance and integrity and enabling non-repudiation. Non-repudiation simply means that the signer cannot deny their signature—a key security principle for digital transactions.

Continue reading “Signed Images from the Red Hat Container Catalog”

27-JAN Webcast: Using the Atomic Registry for Secure Container Image Management

Icon_RH_Hardware_Monitor-Webinar_RGB_ShinyWhen working with container-based applications, admins and developers need a place to store and share container images, a way to deploy them, as well as a way to monitor and administer them once they’re deployed. Join Red Hat software engineers Aaron Weitekamp and Stef Walter for this webcast, Using the Atomic Registry for Secure Container Image Management, on January 27th at 11:00 ET, to gain a better understanding of sharing, deploying, and managing container images.

Continue reading “27-JAN Webcast: Using the Atomic Registry for Secure Container Image Management”

Architecting Containers Part 1: Why Understanding User Space vs. Kernel Space Matters

Perhaps you’ve been charged with developing a container-based application infrastructure?  If so, you most likely understand the value that containers can provide to your developers, architects, and operations team. In fact, you’ve likely been reading up on containers and are excited about exploring the technology in more detail. However, before diving head-first into a discussion about the architecture and deployment of containers in a production environment, there are three important things that developers, architects, and systems administrators, need to know

Continue reading “Architecting Containers Part 1: Why Understanding User Space vs. Kernel Space Matters”