Home > Storage > ObjectScale and ECS > Product Documentation > Dell ObjectScale: General Best Practices > Security with OpenShift
To properly secure various aspects of your Red Hat OpenShift Container Platform cluster, first review the concepts in Understanding container security. That section of the OpenShift documentation, along with the subsequent sections related to container security, provide a high-level walkthrough of the container security measures available in OpenShift Container Platform. Those security measures include solutions for the host layer, the container and orchestration layer, and the build and application layer.
For more information, see How Red Hat OpenShift enables container security and OpenShift Networking and Cluster Access Best Practices.