AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...Sandesh Rao
Ad
Securing Red Hat workloads on Azure - Infographic
1. Learn more at
https://facts.pt/G94Mifm
Securing Red Hat
workloads on Azure
Leveraging the strength of cloud-native security
Run Red Hat workloads with multiple layers of protection on the Azure platform
Infrastructure
Azure Boost, Retina, Azure Monitor, and
other key tools protect the foundational
components of IT environments,
including physical and virtual systems,
networks, and data centers.
Data
Azure uses many approaches to encrypt
data at rest and data in transit. Encryption
approaches for data at rest include server-
side and Azure disk encryption. Encryption
approaches for data in transit include transit
layer support (TLS) encryption and more.
Application
Microsoft Entra ID,
Microsoft Defender for
Cloud, Red Hat®
Insights,
and other tools that
safeguard software can
prevent unauthorized
access, data breaches, and
malicious exploitation.
Code
GitHub Advanced Security
for Azure DevOps protects
code from vulnerabilities,
threats, and malicious
attacks to ensure
integrity, confidentiality,
and availability.
Receive partner
architecture
guidance
Microsoft and Red Hat
have partnered to create a
ready-made starting point
called Landing Zone for Red
Hat Enterprise Linux on Azure.
Get integrated
support for Red Hat
workloads on Azure
Red Hat and Microsoft share
an integrated, co-located
support team that serves as
a unified contact point for
Red Hat ecosystems running
on Azure. This team provides
expertise, knowledge, and
joint support models.
Follow compliance
regulations with
Azure Marketplace
for Red Hat images
Microsoft and Red Hat
engineering teams work closely
to build standard images within
the Azure Marketplace.
Red Hat Enterprise
Linux®
compatibility
with Azure confidential
VMs provides hardware-
based isolation, OS disk
encryption, and more.
How customers win from the
Microsoft and Red Hat partnership
Azure and Red Hat integration
points and compatibilities
Integrating Microsoft
Entra and Red Hat Identity
Management enables
IT teams to centralize
administrative functionality
and user maintenance.
Customers can use Microsoft
Defender for Cloud for system
auditing, security management,
and threat protection. Users
can also connect Red Hat on
Azure VMs to Red Hat Insights
automatically for monitoring.
See more examples in the report.
Security
Copyright 2025 Principled Technologies, Inc. Based on “Securing Red Hat workloads on Azure,”
a Principled Technologies report, February 2025. Principled Technologies®
is a registered trademark
of Principled Technologies, Inc. All other product names are the trademarks of their respective owners.
Principled
Technologies®