Exercise 1Understanding our hackathon environmentopenshiftsecurityLet's get familiar with our hackathon setup.
Exercise 2Laying the foundations for cluster securityopenshiftsecurityCan't have security without a security platform
Exercise 3Encrypting cluster internal network trafficopenshiftsecurityipsecencryptionIs OpenShift secure by default?
Exercise 4Securing vulnerable workloadsopenshiftsecuritycve-managementrhacsHow do we deal with vulnerable workloads we can't patch?
Exercise 5Understanding cluster complianceopenshiftcompliancenistrhacsLet's apply an industry benchmark!
Exercise 7Bonus challenge - Supply chain shmozzleopenshiftsupply-chainrhtasTime to sign your life away...