Powered by deep integrations with Kubernetes, Red Hat® Advanced Cluster Security for Kubernetes (RHACS) is an enterprise-ready, Kubernetes-native container security solution that enables you to securely build, deploy, and run cloud-native applications anywhere
Simplify DevSecOps by providing developers automated guardrails within their existing workflows. Red Hat Advanced Cluster Security integrates with your CI/CD pipelines and image registries to provide continuous image scanning and assurance. By shifting security left, vulnerable and misconfigured images can be remediated within the same developer environment with real-time feedback and alerts.
Whether deployed on-premises or in the cloud, Red Hat Advanced Cluster Security delivers advanced security capabilities to ensure the underlying Kubernetes infrastructure remains hardened and protected. Red Hat Advanced Cluster Security continuously scans your environment against CIS benchmarks and other security best practices and prevents misconfigurations and threats to deliver comprehensive Kubernetes-native protection.
Hundreds of out-of-the-box deploy-time and runtime policies come standard with Red Hat Advanced Cluster Security to prevent risky workloads from being deployed or running. Red Hat Advanced Cluster Security monitors, collects, and evaluates system-level events such as process execution, network connections and flows, and privilege escalation within each container in your Kubernetes environments. Combined with behavioral baselining and allowlisting, it detects anomalous activity indicative of malicious intent such as active malware, cryptomining, unauthorized credential access, intrusions, and lateral movement.
Align security with DevOps by using Kubernetes-native controls to mitigate threats and enforce security policies that minimize operational risk to your applications.
Accelerate the pace of innovation by providing developers actionable and context-rich guardrails embedded into existing workflows and tooling that support developer velocity.
Reduce the overall investment in time, effort, and personnel, and streamline security analysis, investigation, and remediation by using a common source of truth.
Identify and fix vulnerabilities in both container images and Kubernetes across the entire software development life cycle.
Audit your systems against CIS Benchmarks, NIST, PCI, and HIPAA, with interactive dashboards and one-click audit reports.
Visualize existing network traffic and enforce tighter segmentation using Kubernetes-native controls to reduce your blast radius.
See all your deployments ranked by risk level, using context from Kubernetes’ declarative data, to prioritize remediation.
Apply best practices to hardening your Kubernetes environments and workloads for a more secure and stable application.
Use rules, allowlists, and baselining to identify suspicious activity, and take action, to thwart attacks, using Kubernetes for enforcement.
Red Hat Advanced Cluster Management for Kubernetes enables organizations to manage their Kubernetes clusters with consistency across the hybrid cloud.