Securing Containers Throughout the CICD Supply Chain with CyberArk Secrets Manager on Red Hat Open Shift

April 11, 2025

Modern companies use containers to distribute applications and orchestration methods to provision their presence in the cloud, allowing them to scale up or down as needed. But using containers and cloud-native applications increases the challenge of secrets management. That’s where a centralized secrets manager like CyberArk Secrets Manager, working together with Red Hat OpenShift, can help.

In this whitepaper, we’ll cover how Secrets Manager works with Red Hat OpenShift to:

  • Help keep cloud credentials secure
  • Manages the secrets required to access the infrastructure, data and other restricted resources
  • Use the Follow operator when deploying a Kubernetes cluster from within OpenShift

To learn more, check out the Secrets Manager product page.

Previous Article
Identity Security: Why It Matters and Why Now
Identity Security: Why It Matters and Why Now

As identities continue to grow, the attack surface continues to expand —which is why it’s essential for org...

Next Video
Best Practices for Securing DevOps Tools
Best Practices for Securing DevOps Tools

Watch this video to learn about four best practices to secure secrets in DevOps tools.