Security News > 2022 > January > Continuous security and compliance for hybrid cloud, the Red Hat way
Compliance has become so demanding in cloud deployments that many organizations have moved from manual security checks to procedures based on continuous automated monitoring and compliance, notes Lucy Huh Kerner, Red Hat's Director of Security Global Strategy and Evangelism.
Continuous security and compliance are how these issues can be prevented for better security and not merely for "Check-the-box" compliance.
Organizations also need to automate their continuous security and compliance to handle the scale that cloud technologies bring to detect and fix issues in an automated and repeatable way.
OpenSCAP, which is included in a Red Hat Enterprise Linux subscription, can perform compliance and vulnerability scanning on Red Hat Enterprise Linux systems and help teams identify and remediate problems as they crop up.
With OpenSCAP and Red Hat Ansible Automation Platform, you can automate security and compliance scans and remediations at scale in hybrid environments.
Red Hat Advanced Cluster Security, powered by StackRox technology, will assess compliance across hundreds of controls for Center for Internet Security benchmarks, payment card industry, Health Insurance Portability and Accountability Act, and NIST SP 800-190.
News URL
https://go.theregister.com/feed/www.theregister.com/2022/01/13/red_hat_devsecops_hybrid_cloud/
Related news
- Whitepaper: Reach higher in your career with cloud security (source)
- Transforming cloud security with real-time visibility (source)
- 7 Security and Compliance Tips From ISC2 Security Congress (source)
- Top 5 Cloud Security Automations for SecOps Teams (source)
- Microsoft lost some customers’ cloud security logs (source)
- Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers (source)
- Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security (source)
- How AI Is Changing the Cloud Security and Risk Equation (source)
- AWS security essentials for managing compliance, data protection, and threat detection (source)
- Strategies for CISOs navigating hybrid and multi-cloud security (source)