Red Hat Summit 2017 – Planning your Security Labs


This year in Boston, MA you can attend the Red Hat Summit 2017, the event to get your updates on open source technologies and meet with all the experts you follow throughout the year.

It’s taking place from May 2-4 and is full of interesting sessions, keynotes, and labs.

This year I was part of the process of selecting the labs you are going to experience at Red Hat Summit and wanted to share here some to help you plan your hands-on time with security focused labs. These labs are for you to spend time with the experts who will teach you hands-on how to get the most secure environments and applications you can using your open technologies.

Each lab is a 2-hour session, so planning is essential to getting the most out of your days at Red Hat Summit.

As you might be struggling to find and plan your sessions together with some lab time, here is an overview of the labs you can find in the session catalog for exact room and times. Each entry includes the lab number, title, abstract, instructors and is linked to the session catalog entry:

L105190 – Proactive security compliance automation with CloudForms, Satellite, OpenSCAP, Insights, and Ansible Tower

In this hands-on lab, you’ll learn how to automate security compliance using a combination of Red Hat CloudForms, Red Hat Satellite, OpenSCAP, and Ansible Tower by Red Hat. Specifically, you’ll do a series of exercises to show you how to use Red Hat CloudForms to create control policies, how to automate security scans and remediation using the OpenSCAP integration in Satellite, how to utilize the data provided by Red Hat Insights for security compliance automation, how to use Ansible Tower by Red Hat for automated security remediations, and how to use Red Hat CloudForms as a central place for security compliance automation.

Instructor: Lucy Kerner

L99901 – A practical introduction to container security

Linux containers provide convenient application packing and run-time isolation in multi-tenant environments. However, the security implications of running containerized applications is often taken for granted. For example, today it is very easy to pull Docker images from the internet and run them in the enterprise without examining their content and authenticity. In this lab, you’ll complete a series of hands on exercises aimed at understanding the concepts, challenges and best practices associated with deploying containers in a secure fashion.

This session is in Best of Summit series with repeats due to popularity: Repeat session 

Instructors: Bob Kozdemba, Dan Walsh

L102598 – Practical OpenSCAP—security standard compliance and reporting

OpenSCAP is a family of open source Security Content Automation Protocol (SCAP) tools and content that help you create standard security checklists for enterprise systems. Included in Red Hat Enterprise Linux, OpenSCAP provides practical security hardening advice for Red Hat technologies and links to compliance requirements, making deployment activities like certification and accreditation easier. In this lab, we’ll…

Instructors: Robin Price, Martin Preisler

L100049 – Practical SELinux: Writing custom application policy

In this hands-on workshop we will show how SELinux works and why policy is needed. Changes in RHEL 7.3 SELinux userspace introduced the Common Intermediate Language (CIL). We will write policy for a custom application in the current m4 macro language and then compare the same policy when written in CIL. Along with tips and tricks we will show the benefits of CIL and interaction with the new policy analysis tool.

Instructors: Lukas Vrabec, Simon Sekidde, Miroslav Grepl

As you can see, there is plenty of security for you to get hands-on with throughout the week and hope to welcome you to one or more of the labs!

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s