Skip to main content

Über dieses Buch

Use Red Hat’s security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud infrastructure security, and the CI/CD process. Next, you will integrate and automate security into the DevOps cycle, infrastructure, and security as code. You will also learn how to automate with Red Hat Ansible Automation Platform and about hybrid cloud infrastructure.

The later chapters will cover hyper-converged infrastructure and its security, Red Hat Smart Management, predictive analytics with Red Hat Insights, and Red Hat security auditing to ensure best security practices. Lastly, you will see the different types of case studies with real-world examples.

Red Hat and IT Security will help you get a better understanding of IT security concepts from a network and system administration perspective. It will help you to understand how the IT infrastructure landscape can change by implementing specific security best practices and integrating Red Hat products and solutions to counter against modern cybersecurity threats.

What You Will Learn

● Understand IT infrastructure security and its best practices

● Implement hybrid cloud infrastructure

● Realign DevOps process into DevSecOps, emphasizing security

● Implement automation in IT infrastructure services using Red Hat Ansible

● Explore Red Hat Smart Management, predictive analytics, and auditing

Who This Book Is For

IT professionals handling network/system administration or the IT infrastructure of an organization. DevOps professionals and cybersecurity analysts would find the book useful.



Chapter 1. Introduction to IT Security

To build or maintain any secure and sturdy IT (Information Technology) infrastructure, you need to be familiar with and have a working understanding of the basics pertaining to computer networking, system administration, and primary security aspects. This chapter will cover the essential concepts deemed necessary for you to gain a better understanding of security in RHEL (Red Hat Linux Enterprise) and information contained in the following chapters. As almost all administrators are acquainted with the core basics of networking and system administration, this chapter will focus more on the intermediate topics that you will probably want to learn about and might occasionally search for on the internet.
Rithik Chatterjee

Chapter 2. Red Hat Hybrid Cloud Infrastructure

This chapter aims to highlight the key concepts and technologies related to cloud infrastructure and Red Hat cloud environment solutions.
Rithik Chatterjee

Chapter 3. Security in DevOps and Automation

An amalgamation of the words “Development” and “Operations,” the term “DevOps” was coined by Patrick Debois in 2009. It can be defined as a harmonized blend of practices, technologies, culture, and mindset to enable automation and integration of the activities among application development and IT operations teams so as to amplify the building, testing, and deployment processes more efficiently. Once used as a generic term, now DevOps has evolved into an umbrella domain consisting of operations, tools, and culture that shrinks the application development life cycle, through quicker feedback loops that provide functionality, features, and upgrades on a consistent basis.
Rithik Chatterjee

Chapter 4. Red Hat Hyperconverged Infrastructure

This chapter aims to highlight hyperconverged infrastructure, its concepts, operations, and how to ensure its security.
Rithik Chatterjee

Chapter 5. Red Hat Smart Management and Red Hat Insights

This chapter aims to highlight the management of Red Hat Infrastructure across multiple environments and also describe predictive analytics and how it improves the security of any infrastructure.
Rithik Chatterjee

Chapter 6. Red Hat Security Auditing

This chapter aims to highlight the processes related to IT security auditing, its best practices, and auditing implementations in RHEL systems.
Rithik Chatterjee

Chapter 7. Case Studies

Instead of sharing plenty of light case studies with similar scenarios and remediations, three primary case studies have been handpicked, showcasing different attack vectors and appropriate resolutions. Due to confidentiality and sensitivity issues, one of the case studies is kept anonymous, but the attacks are depicted as accurately as possible.
Rithik Chatterjee


Weitere Informationen

Premium Partner