Operational security is a shared responsibility between Red Hat providing OpenShift Dedicated, the public cloud providing infrastructure, and the customer who is hosting their application. As a hosted service provider, Red Hat OpenShift Dedicated has strong processes aligned with well known cyber security standards to manage information security.
This guide covers:
Red Hat Responsibilities: Secure practices used by Red Hat to manage information security as a hosted service provider.
Recommendations for Customers: Recommendations to the customer for securely hosting their applications on Red Hat OpenShift Dedicated.
Responsibilities of Cloud Providers: Responsibilities of the Cloud Service Provider to provide secure infrastructure for hosting Red Hat OpenShift Dedicated and customer applications.