피드 구독

Security continues to be a top priority for organizations managing Kubernetes clusters. Red Hat has made significant strides for improved security for containers with its latest release of Red Hat Advanced Cluster Security 4.8. This release focuses on simplifying management, enhancing workflows and offering visibility into the security of containerized environments.

External IP visibility for improved security

Red Hat Advanced Cluster Security 4.8 introduces the general availability of a powerful new feature: The ability to visualize external IPs directly within the network graph dashboard. This feature addresses a long-standing blind spot for customers seeking a comprehensive understanding of their outbound connections. By providing a clear picture of potential threats from external sources, alongside Red Hat Advanced Cluster Security's renowned detailed Layer 4 network security features, this update significantly strengthens security posture.

By default, this feature is disabled. Once it's enabled, you  see external IPs in the Network Graph, and Unauthorized Network Flow violations include detailed external IP information to streamline your investigation process. 

Red Hat OpenShift Infrastructure Compliance

One of the standout features in Red Hat Advanced Cluster Security 4.8 is the general availability of OpenShift Infrastructure Compliance. Red Hat Advanced Cluster Security and the OpenShift Infrastructure Compliance operator assess compliance standards across your OpenShift fleet to help ensure that your OpenShift infrastructure adheres to organizational security policies.

The new capabilities also include enhanced compliance reporting. This ensures that you receive complete compliance reports, even when some clusters fail during a scheduled scan. This provides continuous visibility into the compliance status of successfully scanned clusters, enabling organizations to maintain security oversight even in the face of occasional scan failures.

Scanner V4 for vulnerability scanning

In RHACS 4.8, Scanner V4 is now the default scanner for reporting vulnerabilities in user workloads, platform components, and nodes. This marks a significant improvement in vulnerability scanning, because Scanner V4 brings advanced capabilities such as SBOM generation, CSAF VEX vulnerability feeds, and enhanced reporting for security vulnerabilities. 

For new installations, Scanner V4 is used automatically, while existing installations continue to use the previously configured scanner unless you manually update it. This ensures there's no disruption to existing user workflows. 

Enhanced vulnerability advisories

Starting with Red Hat Advanced Cluster Security 4.8, you can get separate reporting for the Common Vulnerability and Exposures (CVE) database and Red Hat Security Advisories (RHSA) in the vulnerability management dashboard. Previously, RHACS replaced CVE IDs with RHSA IDs once a fix was available. With this new enhancement, both CVE and RHSA issues are reported separately, providing detailed and transparent information about vulnerabilities and the fixes that have been issued. 

This ensures that users have a clearer understanding of both the specific vulnerabilities and the advisories associated with them.

Support for keyless signing verification

We've significantly advanced our Keyless Sigstore integration by supporting validation of images signed with short-lived credentials. This crucial capability is made possible through seamless integration with Rekor and transparency logs, ensuring more robust security measures for your software supply chain and building on the Sigstore integration supported since Red Hat Advanced Cluster Security 4.4.

This advancement also facilitates a keyless signing workflow. Fulcio can now integrate with OIDC identity providers, allowing users to exchange an identity token for a short-lived credential used for image signing. This simplifies the signing process while supporting a robust security posture.

Build time network tools with B/ANP support for connectivity analysis

The Red Hat Advanced Cluster Security build time network tools help your Kubernetes network security shift left as you proactively develop network policies before deployment. This release introduces two key enhancements for connectivity mapping: 

  • Connectivity mapping now understands admin network policies (ANP) and baseline admin network policies (B/ANP). It considers B/ANP resources when present , and correctly computes effective connectivity rules.
  • Explainability is a feature that identifies the resources and rules allowing or denying workload connectivity. It clarifies network policy interactions, aiding administrators in understanding and troubleshooting network security.

For more information on build time network tools, read the product documentation.

Platform components customization

Red Hat Advanced Cluster Security helps you focus on actionable data by classifying vulnerability and policy violation issues as either User Workload or Platform. With Red Hat Advanced Cluster Security 4.8, you can view and customize this definition (should you install Red Hat products, including Red Hat Advanced Cluster Security itself, into a non-default namespace, then you must update the layered products definition.) You can also classify other namespaces as Platform, which is useful for excluding third-party applications from the focused User Workloads views. 

Policy as Code

Formerly available as a technology preview, policy as code in Red Hat Advanced Cluster Security 4.8 is generally available. This feature enables organizations to manage Red Hat Advanced Cluster Security policies as Kubernetes custom resources, integrating them into your GitOps workflow. With this release, a policy can be managed using Red Hat GitOps (Argo CD) and similar tools. 

Try it today

You can read the full Red Hat Advanced Cluster Security 4.8 release notes for details, and try Red Hat Advanced Cluster Security4.8 for 60 days to experience it for yourself.

Hub

Red Hat Product Security

Red Hat은 모든 직원이 근무 위치와 상관없이 보안 및 개인정보 위험을 완화하는 데 필요한 양질의 정보와 그렇게 할 수 있는 액세스 권한을 이용할 자격이 있다고 믿습니다.

저자 소개

UI_Icon-Red_Hat-Close-A-Black-RGB

채널별 검색

automation icon

오토메이션

기술, 팀, 인프라를 위한 IT 자동화 최신 동향

AI icon

인공지능

고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트

open hybrid cloud icon

오픈 하이브리드 클라우드

하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요

security icon

보안

환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보

edge icon

엣지 컴퓨팅

엣지에서의 운영을 단순화하는 플랫폼 업데이트

Infrastructure icon

인프라

세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보

application development icon

애플리케이션

복잡한 애플리케이션에 대한 솔루션 더 보기

Virtualization icon

가상화

온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래