Skip to contentRed Hat

Navigation

AI
  • Our approach

    • News and insights
    • Technical blog
    • Research
    • Live AI events
    • Explore AI at Red Hat
  • Our portfolio

    • Red Hat AI
    • Red Hat Enterprise Linux AI
    • Red Hat OpenShift AI
    • Red Hat AI Inference Server New
  • Engage & learn

    • AI learning hub
    • AI partners
    • Services for AI
Hybrid cloud
  • Use cases

    • Artificial intelligence

      Build, deploy, and monitor AI models and apps.

    • Linux standardization

      Get consistency across operating environments.

    • Application development

      Simplify the way you build, deploy, and manage apps.

    • Automation

      Scale automation and unite tech, teams, and environments.

    • Virtualization

      Modernize operations for virtualized and containerized workloads.

    • Security

      Code, build, deploy, and monitor security-focused software.

    • Edge computing

      Deploy workloads closer to the source with edge technology.

    • Explore solutions
  • Solutions by industry

    • Automotive
    • Financial services
    • Healthcare
    • Industrial sector
    • Media and entertainment
    • Public sector
    • Telecommunications

Discover cloud technologies

Learn how to use our cloud products and solutions at your own pace in the Red Hat® Hybrid Cloud Console.

Products
  • Platforms

    • Red Hat AI

      Develop and deploy AI solutions across the hybrid cloud.

    • Red Hat Enterprise Linux

      Support hybrid cloud innovation on a flexible operating system.

      New version
    • Red Hat OpenShift

      Build, modernize, and deploy apps at scale.

    • Red Hat Ansible Automation Platform

      Implement enterprise-wide automation.

  • Featured

    • Red Hat OpenShift Virtualization Engine
    • Red Hat OpenShift Service on AWS
    • Microsoft Azure Red Hat OpenShift
    • See all products
  • Try & buy

    • Start a trial
    • Buy online
    • Integrate with major cloud providers
  • Services & support

    • Consulting
    • Product support
    • Services for AI
    • Technical Account Management
    • Explore services
Training
  • Training & certification

    • Courses and exams
    • Certifications
    • Red Hat Academy
    • Learning community
    • Learning subscription
    • Explore training
  • Featured

    • Red Hat Certified System Administrator exam
    • Red Hat System Administration I
    • Red Hat Learning Subscription trial (No cost)
    • Red Hat Certified Engineer exam
    • Red Hat Certified OpenShift Administrator exam
  • Services

    • Consulting
    • Partner training
    • Product support
    • Services for AI
    • Technical Account Management
Learn
  • Build your skills

    • Documentation
    • Hands-on labs
    • Hybrid cloud learning hub
    • Interactive learning experiences
    • Training and certification
  • More ways to learn

    • Blog
    • Events and webinars
    • Podcasts and video series
    • Red Hat TV
    • Resource library

For developers

Discover resources and tools to help you build, deliver, and manage cloud-native applications and services.

Partners
  • For customers

    • Our partners
    • Red Hat Ecosystem Catalog
    • Find a partner
  • For partners

    • Partner Connect
    • Become a partner
    • Training
    • Support
    • Access the partner portal

Build solutions powered by trusted partners

Find solutions from our collaborative community of experts and technologies in the Red Hat® Ecosystem Catalog.

Search

I'd like to:

  • Start a trial
  • Manage subscriptions
  • See Red Hat jobs
  • Explore tech topics
  • Contact sales
  • Contact customer service

Help me find:

  • Documentation
  • Developer resources
  • Skills assessments
  • Architecture center
  • Security updates
  • Support cases

I want to learn more about:

  • AI
  • Application modernization
  • Automation
  • Cloud-native applications
  • Linux
  • Virtualization
ConsoleDocsSupportNew For you

Recommended

We'll recommend resources you may like as you browse. Try these suggestions for now.

  • Product trial center
  • Courses and exams
  • All products
  • Tech topics
  • Resource library
Log in

Sign in or create an account to get more from Red Hat

  • World-class support
  • Training resources
  • Product trials
  • Console access

A subscription may be required for some services.

Log in or register
Contact us
  • Home
  • Resources
  • Red Hat Advanced Cluster Security for Kubernetes 

Red Hat Advanced Cluster Security for Kubernetes 

August 19, 2024•
Resource type: Datasheet
Download PDF

Introduction

Protecting cloud-native applications requires significant changes in how we approach security. We must apply controls earlier in the application development lifecycle, use the infrastructure itself to apply controls, provide developer-friendly guardrails, and keep up with increasingly rapid release schedules.

Red Hat® Advanced Cluster Security for Kubernetes, powered by StackRox, protects your vital applications across build, deploy, and runtime. Our software deploys in your Kubernetes infrastructure as a self-managed security solution or you can consume it as a fully managed Software-as-a-Service (SaaS). Additionally, it integrates with your existing DevOps tooling and workflows to deliver dependable security and compliance. The policy engine includes hundreds of built-in controls to enforce DevOps and security-focused practices based on industry standards such as Center for Internet Security (CIS), Benchmarks and National Institute of Standards Technology (NIST) guidelines, configuration management of both containers and Kubernetes, and runtime security.

Red Hat Advanced Cluster Security provides a Kubernetes-native architecture for platform and application security, allowing DevOps and InfoSec teams to operationalize security.

A Kubernetes-native security solution for cloud-native applications

Features and benefits

  • Lower operational cost
    • Guide development, operations and security teams towards a common set of Kubernetes-native security tooling and practices, and providing guardrails for individual users.
    • Use Kubernetes-native controls across the build, deploy and runtime phases of the application for better visibility and management of vulnerabilities, policy and configuration violations, and application runtime behavior.
    • Reduce the cost of addressing a security issue by catching and fixing it in the development stage (Shift Left).
  • Reduce operational risk
    • Align security and infrastructure to reduce application downtime using built-in Kubernetes capabilities, such as Kubernetes network policies for segmentation, and admission controller for security policy enforcement.
    • Mitigate threats using Kubernetes-native security controls to enforce security policies, minimizing potential impacts to your applications and infrastructure operations. For example, using controls to contain a successful breach by automatically instructing Kubernetes to scale suspicious pods to zero or to delete then restart instances of breached applications.
  • Increase developer productivity
    • Actively scan for vulnerabilities in repositories, development pipelines and in production.
    • Take advantage of Kubernetes and existing continuous integration and continuous delivery (CI/CD) tooling to provide integrated security guardrails supporting developer velocity while still maintaining the desired security posture.
    • Synchronize updates and support with Red Hat OpenShift® releases, ensuring compatibility and up-to-date security features.
    • Use Red Hat certified vulnerability data, ensuring higher accuracy and relevance for Red Hat OpenShift environments.

Detailed benefits

AreaBenefits
Visibility
  • Delivers a comprehensive view of your Kubernetes environment, including all images, pods, deployments, namespaces, and configurations.
  • Discovers and displays network traffic in all clusters spanning namespaces, deployments, and pods .
  • Captures critical system-level events in each container for incident detection.
Vulnerability management
  • Detect host-level vulnerabilities and potential security threats in Red Hat Enterprise Linux® CoreOS.
  • Scan images for known vulnerabilities in specific languages, packages, and image layers.
  • Highlight the riskiest image vulnerabilities and deployments to prioritize response.
  • Correlate vulnerabilities to namespaces, running deployments, and images.
  • Categorize findings by platform, node, workload to simplify tracking and ownership.
  • Enforce policies based on vulnerability details at build, deploy and runtime.
  • Integrate ACS with third-party solutions using roxctl and/or the application programming interface (API) to provide vulnerability notifications in the tools teams use everyday (Jira and ServiceNow).
Compliance
  • Assess compliance with technical controls from security and regulatory frameworks, including CIS, payment card industry (PCI), NIST SP 800-53, DISA STIG, and NERC-CIP.
  • View overall compliance across the controls of each standard with the ability to export evidence for auditors.
  • Drill-down to detailed views of compliance results to pinpoint clusters, namespaces, nodes, or deployments namespaces that require remediation.
  • Schedule compliance scans and automate creation of evidence-based reports.
Network segmentation
  • Visualize allowed vs. active traffic between namespaces, deployments, and pods, including external exposures at runtime.
  • Identify running processes listening on ports.
  • Identify anomalous network traffic and inform and enforce runtime policies.
  • Alert on policy violations when forbidden traffic is observed.
  • Generate a connectivity graph and show contextual diff between 2 versions of the application prior to deployment.
  • Simulate network policy changes in runtime before they are implemented to minimize operational risk to the environment.
  • Shift-left creation of Kubernetes network policies by analyzing application manifests prior to deployment.
Risk profiling
  • Heuristically ranks running deployments according to their overall security risk by combining factors such as vulnerabilities, configuration policy violations, and runtime activity.
  • Track changes in the security posture of your Kubernetes deployments to validate the effect of your security team’s actions.
  • Search running deployments in all clusters to model threat vectors and uncover risk patterns.
Configuration management
  • Deliver prebuilt DevOps and security policies to identify configuration violations related to network exposures, privileged containers, processes running as root, and compliance with industry standards.
  • Analyze Kubernetes role-based access control (RBAC) settings to determine user or service account privileges and misconfigurations.
  • Track secrets and detect which deployments use the secrets to limit access.
  • Enforce configuration policies—at build time with CI/CD integration and at deploy time using dynamic admission control.
Runtime detection and response
  • Monitor events to detect anomalous activity indicative of a threat with correlation to Kubernetes objects.
  • Implement non-destructive automated response using Kubernetes-native controls with minimal effect on business operations.
  • Baseline process activity in containers to whitelist processes automatically, eliminating the need to manually whitelist.
  • Use prebuilt policies to detect crypto mining, privilege escalation, and various exploits.
  • Monitor Kubernetes admin events and block malicious behavior.
  • Integrate with external security integration event management (SIEM) and security orchestration, automation, and response (SOAR) solutions to power remediation workflows. 
Security policy guardrails
  • Identify security configuration weaknesses such as network exposures, privileged containers, processes running as root, with out-of-the-box policies that can be applied at build, deploy or runtime.
  • Create custom policies based on Kubernetes-native constructs, including Kubernetes API, audit logs, namespace resources.
  • Provide supply chain security by integrating Advanced Cluster Security with CI/CD pipelines to check for known vulnerabilities and misconfigurations prior to deployment.
  • Verify image signatures for image attestation and integrity.
  • Analyze Kubernetes role-based access control (RBAC) settings to flag user or service account privileges and misconfigurations.
  • Track secrets and detect which deployments use the secrets.
  • Scale management of policies through the use of Kubernetes labels and by managing policies as code.
Integrations
  • Provides a rich API and prebuilt plugins to integrate with DevOps systems, including CI/CD tools, image scanners, sigstore, registries, container runtimes, SIEM solutions, and notification tools.


Ready to see Red Hat Advanced Cluster Security in action?

Start your no-cost trial today

Tags:Security automation

Red Hat logoLinkedInYouTubeFacebookX

Products & portfolios

  • Red Hat AI
  • Red Hat Enterprise Linux
  • Red Hat OpenShift
  • Red Hat Ansible Automation Platform
  • Cloud services
  • See all products

Tools

  • Training and certification
  • My account
  • Customer support
  • Developer resources
  • Find a partner
  • Red Hat Ecosystem Catalog
  • Documentation

Try, buy, & sell

  • Product trial center
  • Red Hat Store
  • Buy online (Japan)
  • Console

Communicate

  • Contact sales
  • Contact customer service
  • Contact training
  • Social

About Red Hat

Red Hat is an open hybrid cloud technology leader, delivering a consistent, comprehensive foundation for transformative IT and artificial intelligence (AI) applications in the enterprise. As a trusted adviser to the Fortune 500, Red Hat offers cloud, developer, Linux, automation, and application platform technologies, as well as award-winning services.

  • Our company
  • How we work
  • Customer success stories
  • Analyst relations
  • Newsroom
  • Open source commitments
  • Our social impact
  • Jobs

Select a language

  • 简体中文
  • English
  • Français
  • Deutsch
  • Italiano
  • 日本語
  • 한국어
  • Português
  • Español

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility