Next steps for providing container-level security to a Kubernetes cluster with RHACS
You have now completed this learning path! Now you have a working knowledge of the security measures that go into securing containers not only for your own clusters, but others that are running Kubernetes orchestration. After completing this tutorial, you now have:
- Understanding of Linux® container security concerns and mitigations
- Understanding Kubernetes security concerns and tooling
- Knowledge of how to protect workloads in Kubernetes
- Working knowledge of how to use Red Hat Advanced Cluster Security for Kubernetes
What comes next?
Now that you are familiar with Kubernetes container security and how Red Hat Advanced Cluster Security for Kubernetes can help, try a no-cost product trial of it today.