The Red Hat Ecosystem Catalog is the official source for discovering and learning more about the Red Hat Ecosystem of both Red Hat and certified third-party products and services.
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
Made for DevOps and Trusted by CISOs, Cyber Armor enables DevOps teams to automatically create hardened OpenShift and Hybrid environments using existing DevOps tools and processes.
Cyber Armor is the first to deliver runtime workload memory protection, Network control, and data protection under a single service-to-service control plane, simplifying operations and increasing visibility and security.
Through patented technology, Cyber Armor seamlessly integrates with the CI/CD pipeline to learn every workload and create a software DNA by scanning all binaries, scripts and configurations. It then automatically validates all running workloads against that DNA in-memory, in runtime. Immediately and deterministically identifying any software attack, memory exploit or fileless malware.
The Cyber Armor control plane assures only such approved and healthy state workloads can connect with each other and access data while enabling the user to easilty configure network access and data access policies based on workload identities and attributes.
The result is more resilient and highly visible production environments with less required security gates and security configurations which means shorter development to production cycles, higher visibility and change control, better compliance readiness and of course stronger security.
The following information was extracted from the containerfile and other sources.
| Summary | Armo Operator summary |
| Description | The Universal Base Image Minimal is a stripped down image that uses microdnf as a package manager. This base image is freely redistributable, but Red Hat only supports Red Hat technologies through subscriptions for Red Hat products. This image is maintained by Red Hat and updated regularly. |
| Provider | CyberArmor |
| Maintainer | Red Hat, Inc. |
The following information was extracted from the containerfile and other sources.
| Repository name | Armo Operator |
| Image version | 0.0.1 |
| Architecture | amd64 |
| User | 1001 |
| Working directory | /opt/helm |
Use the following instructions to get images from a Red Hat container registry using registry service account tokens. You will need to create a registry service account to use prior to completing any of the following tasks.
First, you will need to add a reference to the appropriate secret and repository to your Kubernetes pod configuration via an imagePullSecrets field.
Then, use the following from the command line or from the OpenShift Dashboard GUI interface.
Use the following command(s) from a system with podman installed
Use the following command(s) from a system with docker service installed and running
Use the following instructions to get images from a Red Hat container registry using your Red Hat login.
For best practices, it is recommended to use registry tokens when pulling content for OpenShift deployments.
Use the following command(s) from a system with podman installed
Use the following command(s) from a system with docker service installed and running