Operational security is a shared responsibility between Red Hat providing OpenShift Dedicated, the public cloud providing infrastructure, and the customer who is hosting their application. As a hosted service provider, Red Hat OpenShift Dedicated has strong processes aligned with well known cyber security standards to manage information security.

This guide covers:

  • Red Hat Responsibilities: Secure practices used by Red Hat to manage information security as a hosted service provider.

  • Recommendations for Customers: Recommendations to the customer for securely hosting their applications on Red Hat OpenShift Dedicated.

  • Responsibilities of Cloud Providers: Responsibilities of the Cloud Service Provider to provide secure infrastructure for hosting Red Hat OpenShift Dedicated and customer applications.