Demystifying Red Hat OpenShift: What Is It?
Understand what Red Hat OpenShift adds to Kubernetes, how it compares to vanilla K8s, and whether it's the right enterprise platform for your organization.
THNKBIG Team
Engineering Insights
Red Hat OpenShift appears everywhere in enterprise Kubernetes conversations — but many organizations aren't sure what it actually is, how it differs from vanilla Kubernetes, and whether it's the right choice for their situation. This guide cuts through the confusion.
What Is OpenShift?
Red Hat OpenShift is an enterprise Kubernetes platform. At its core it runs Kubernetes — but adds a significant layer of security hardening, developer tooling, built-in CI/CD, and enterprise support that vanilla Kubernetes doesn't provide out of the box.
Think of it this way: Kubernetes is the engine. OpenShift is the complete vehicle — engine, safety systems, dashboard, seats, and a warranty. It is built on OKD (the upstream community distribution), which is built on Kubernetes. Red Hat adds proprietary features, certification programs, and commercial support on top.
OpenShift vs. Vanilla Kubernetes: Key Differences
The most significant differences fall into five areas: security posture, included tooling, container runtime, installer approach, and support model.
- Security defaults: Kubernetes is permissive by default; OpenShift is restrictive — Security Context Constraints block root containers and privileged mode automatically
- Included tooling: OpenShift bundles a built-in image registry, Tekton CI/CD pipelines, ArgoCD GitOps, and a developer web console; vanilla Kubernetes includes none of these
- Container runtime: Kubernetes defaults to containerd; OpenShift uses CRI-O
- Certifications: OpenShift provides FIPS 140-2 validated builds and DISA STIG compliance; vanilla Kubernetes does not
- Support model: vanilla Kubernetes is community-supported; OpenShift comes with Red Hat commercial support and contractual SLAs
OpenShift Security: Security Context Constraints Explained
The most significant architectural difference is security posture. Vanilla Kubernetes allows containers to run as root, use hostPath mounts freely, and access privileged mode without restriction. OpenShift blocks all of this by default through Security Context Constraints (SCCs).
By default, OpenShift rejects containers running as root without an explicit SCC grant, blocks arbitrary UIDs, prevents host network/PID/IPC namespace access, and requires privileges to be explicitly approved. This restrictive posture makes OpenShift significantly easier to secure for HIPAA, FedRAMP, and PCI-DSS — but sometimes requires application refactoring for software built assuming root access.
OpenShift Deployment Models
OpenShift comes in several deployment models to fit different organizational needs and cloud strategies:
- OpenShift Container Platform (OCP) — self-managed on-premises or any cloud; maximum control and flexibility
- ROSA (Red Hat OpenShift Service on AWS) — fully managed by Red Hat on AWS infrastructure
- ARO (Azure Red Hat OpenShift) — jointly managed by Red Hat and Microsoft on Azure
- OpenShift Dedicated — fully managed by Red Hat on AWS or GCP
- MicroShift — lightweight single-node deployment for edge devices and RHEL servers
The Operator Framework: Automating Stateful Application Management
Operators are OpenShift's approach to automating stateful application management. An Operator packages the operational knowledge of a human administrator into software — knowing how to install, upgrade, scale, backup, and recover a specific application automatically.
OpenShift ships with the Operator Lifecycle Manager (OLM) and OperatorHub — a catalog of pre-built Operators for databases, middleware, monitoring stacks, and security tools. Running complex stateful workloads like PostgreSQL, Kafka, and Elasticsearch becomes dramatically more manageable in production.
When to Choose OpenShift vs. Vanilla Kubernetes
Choose OpenShift when:
- Your organization requires FIPS 140-2 validated cryptography (federal, healthcare, defense)
- DISA STIG compliance is required by your accreditation or authorization process
- Enterprise support with contractual SLAs is non-negotiable for your operations team
- You're running on-premises and need an opinionated, fully integrated platform stack
Choose managed vanilla Kubernetes (EKS, AKS, GKE) when:
- You're deeply invested in a specific cloud provider's native services and want seamless integration
- You have strong in-house Kubernetes platform engineering expertise and prefer to own your tooling choices
- Cost optimization is a primary driver — OpenShift licensing adds meaningful cost per node at scale
OpenShift Consulting with THNKBIG
THNKBIG is a Red Hat partner with hands-on experience deploying and operating OpenShift for enterprise and government clients. Our team holds Red Hat certifications and has implemented OpenShift-based platforms for organizations in aerospace, defense, financial services, and healthcare across the United States.
Whether you're evaluating OpenShift for the first time, migrating from vanilla Kubernetes, or optimizing an existing deployment — our OpenShift practice team can help. Contact us to get started.
Red Hat OpenShift is an enterprise Kubernetes distribution that layers security hardening, curated tooling, and commercial support on top of upstream Kubernetes. If Kubernetes is analogous to the Linux kernel, OpenShift is closer to Red Hat Enterprise Linux: same core, but shipped as an opinionated, supported platform.
What Is Red Hat OpenShift?
OpenShift is a Kubernetes-based application platform. Red Hat takes upstream Kubernetes, integrates it with a set of vetted components (container runtime, registry, CI/build tooling, web console, operators), and delivers it as a cohesive, tested distribution with SLAs.
Key differences from vanilla Kubernetes include:
- Included tooling
- Operator framework and catalog
- Integrated internal image registry
- Build automation via BuildConfigs and image streams
- A full-featured web console for developers and operators
- Stricter security defaults
- Pods are not allowed to run as root by default
- Security Context Constraints (SCCs) provide fine-grained control over pod capabilities, replacing upstream Pod Security Admission
- Certified operator ecosystem
- Enterprise software packaged as operators and certified to run on OpenShift
- Enterprise support
- Red Hat provides support and SLAs across the stack, from OS and container runtime through platform components
OpenShift can run on AWS, Azure, GCP, bare metal, and on-premise. It is available as:
- Self-managed OpenShift Container Platform (OCP)
- Managed services such as:
- ROSA (Red Hat OpenShift Service on AWS)
- ARO (Azure Red Hat OpenShift)
A Brief History
OpenShift has gone through several major evolutions:
- 2011 – Makara created OpenShift as a PaaS using custom runtimes, predating Kubernetes
- 2012 – Re-architected around open-source components
- 2014 – Red Hat acquired Makara
- 2015 (v3) – Rebuilt on Kubernetes and Docker
- 2019 (v4) – Moved to CRI-O as the container runtime and adopted Podman and Buildah; platform restructured around operators
- 2019 – IBM acquired Red Hat
The community upstream for OpenShift is OKD (Origin Kubernetes Distribution). OKD is free and open-source, with similar concepts and APIs but without Red Hat’s commercial support.
OpenShift vs. Vanilla Kubernetes
| Feature | Vanilla Kubernetes | Red Hat OpenShift |
|----------------------|--------------------------|-----------------------------------|
| Container runtime | containerd (default) | CRI-O |
| Security defaults | More permissive | Restrictive (SCCs) |
| Developer console | Minimal | Rich web UI for dev & ops |
| Build automation | External (e.g., Tekton) | Built-in BuildConfigs & pipelines |
| Image registry | External | Integrated internal registry |
| Operator ecosystem | OperatorHub | Certified OperatorHub |
| FIPS support | Extra configuration | FIPS-validated builds available |
| Support | Community / vendor cloud | Red Hat enterprise SLA |
Security Posture
OpenShift emphasizes secure-by-default behavior:
- Security Context Constraints (SCCs)
- Control pod permissions, user IDs, capabilities, and host access
- Provide more granular, policy-driven security than upstream Pod Security Admission
- FIPS 140-2 validated builds
- Available for environments that require cryptographic module validation (e.g., FedRAMP, DoD IL)
- Read-only root filesystem
- Platform components are configured with read-only root filesystems by default
- Network isolation
- Namespaces (projects) are isolated by default
- Kubernetes NetworkPolicies can be used to further refine traffic flows
These characteristics make OpenShift attractive to government, defense, and healthcare organizations that must meet strict compliance and security requirements.
When OpenShift Makes Sense
OpenShift is a strong fit when:
- You need FedRAMP, DoD IL, or similar regulatory compliance, and FIPS-validated builds are mandatory
- You want a batteries-included, opinionated platform with integrated registry, build, and operator tooling
- Your organization prefers a single platform team and vendor to own OS, container runtime, and platform stack
- You already have a Red Hat enterprise relationship and want to consolidate support and procurement
Vanilla Kubernetes (or cloud-managed services like EKS, AKS, GKE) may be preferable when:
- You want to assemble your own tooling and avoid platform-level opinions
- Your cloud provider’s managed Kubernetes already meets your compliance and security needs
- You require maximum flexibility in runtime, networking, and ecosystem choices
Getting Started with OpenShift
Ways to try or adopt OpenShift include:
- Developer Sandbox
- Free, time-limited hosted OpenShift environment from Red Hat (via developers.redhat.com)
- OKD
- Community upstream of OpenShift
- Free to run on your own infrastructure (github.com/openshift/okd)
- ROSA (Red Hat OpenShift Service on AWS)
- Managed OpenShift on AWS, billed through your AWS account
- ARO (Azure Red Hat OpenShift)
- Managed OpenShift on Azure, jointly supported by Red Hat and Microsoft
For on-premise deployments, the OpenShift installer supports bare metal, VMware vSphere, and KVM via libvirt.
Production Best Practices
To run OpenShift effectively in production:
- Use operators for stateful services
- Deploy databases, message brokers, monitoring stacks, and similar workloads via certified operators from OperatorHub
- Manage SCCs carefully
- Understand which SCC each workload requires
- Avoid broad grants like
anyuidunless absolutely necessary - Integrate identity early
- Configure OpenShift’s OAuth server with your IdP (OIDC, Active Directory, GitHub, etc.) to centralize authentication and RBAC
- Enable etcd encryption
- Not enabled by default, but often required for regulated workloads to protect data at rest in the control plane
- Leverage image streams
- Use image streams to track base images and enable controlled, zero-downtime rollouts when base images are updated
Key Takeaways
- OpenShift is enterprise Kubernetes: upstream Kubernetes plus security hardening, integrated tooling, and Red Hat support
- It demands more platform knowledge than cloud-managed Kubernetes services but provides more out-of-the-box capabilities
- FIPS 140-2 validated builds and hardened defaults make OpenShift a leading choice for federal and highly regulated environments
- OKD is the free, community upstream that mirrors OpenShift concepts and is suitable for learning and non-supported deployments
THNKBIG is a Red Hat partner with practical OpenShift delivery experience. We help organizations assess whether OpenShift fits their requirements and implement it for production workloads. Talk to us about OpenShift.
Explore Our Solutions
Related Reading
What is Backstage? Spotify's Open-Source Platform
Crossplane: A Game-Changer for Midmarket Companies
The Cloud Native Ecosystem: An Overview
A practical map of the CNCF ecosystem: project tiers, stack layers from runtime to observability, and a four-level maturity model for enterprise cloud native adoption.
THNKBIG Team
Engineering Insights
Expert infrastructure engineers at THNKBIG, specializing in Kubernetes, cloud platforms, and AI/ML operations.
Ready to make AI operational?
Whether you're planning GPU infrastructure, stabilizing Kubernetes, or moving AI workloads into production — we'll assess where you are and what it takes to get there.
US-based team · All US citizens · Continental United States only