SUSE and Red Hat Leftovers
-
YaST Development Report - Chapter 7 of 2022 | YaST
We all know there is a series of good practices that must be observed when installing and administering any computer system in order to minimize the security hazards. In some cases, those good practices are formalized into a so-called security policy that defines the guidelines that must be observed in order for a given system to be accepted in a secure environment. In that regard, the DISA (Defense Information Systems Agency) and SUSE have authored a STIG (Secure Technical Implementation Guide) that describes how to harden a SUSE Linux Enterprise system.
The STIG is a long list of rules, each containing description, detection of problems and how to remediate problems on a per rule basis. There are even some tools to automate the detection and remediation of many of the problems in an already installed systems. But some aspects are very hard to correct if they are not properly set during the installation process of the operating system, like the need of encrypting all the relevant filesystems or honoring certain restrictions in how the devices are formatted and the mount points are defined.
So we are actively working on adding the concept of security policies to both the interactive installation and AutoYaST. It is still a work in progress and we will offer a more detailed review of the feature when it’s ready to hit the repositories.
-
Kubernetes-native object storage with MinIO for SUSE Rancher | SUSE Communities
Modern enterprises are data-driven and cloud-centric. The latter is a mentality, not a place. The core concepts of the cloud: containerization, orchestration, APIs and automation are the defining characteristics of success for companies in the modern world.
Central to this mentality, indeed, perhaps the defining characteristic, is Kubernetes. Kubernetes initially gained popularity as the go-to platform for deploying and orchestrating containerized workloads on distributed systems, but the platform is proving to deliver much more than orchestration. Kubernetes is rapidly becoming a primary control and management point for enterprises because of its ability to treat infrastructure as code.
Kubernetes was developed to manage containerized workloads and automate application deployment, scaling and provide a software-controlled infrastructure that abstracts away the intricacies of underlying hardware, operating systems and underlying deployment models.
-
Turning interesting times into normalcy: The constant value of a Red Hat subscription
For more than 20 years, Red Hat has worked to improve the IT experience. We do this through our technology, which adds hardening against wave after wave of software vulnerabilities and potential zero-day exploits, while also helping to make open source innovation more stable. The primary way we actually make IT better, however, is via a Red Hat subscription.
A Red Hat subscription is much more than just a way to buy software. It's how we provide open, innovative technology to IT teams, and how we help our customers support, maintain, manage and better secure their environments. A subscription also provides our customers with a clear way of holding Red Hat accountable to their business goals because we need to earn their business every single year, unlike traditional licenses.
-
Tips for Successful Open Source Program Management
Open source projects produce software, but they’re run by people, says Ben Cotton. Moreover, he notes, “people are dynamic and sometimes unpredictable. The more people are involved, the more unpredictable the project becomes.”
And, that’s where program managers can help. “As a program manager, you bring order to the chaos. You don’t do this by imposing order from the top down—that’s not how open source projects work. Instead, you give structure to the agreements of the community,” says Cotton, the Fedora Program Manager at Red Hat.