Contact

Contact

Console log in

Console log in

Red Hat Advanced Cluster Security for Kubernetes

Powered by deep integrations with Kubernetes, Red Hat® Advanced Cluster Security for Kubernetes (RHACS) is an enterprise-ready, Kubernetes-native container security solution that enables you to securely build, deploy, and run cloud-native applications anywhere

Download datasheet

Logo-Red_Hat-OpenShift_Container_Platform-A-Standard-RGB

Red Hat® OpenShift® offers a consistent hybrid cloud foundation for building and scaling containerized applications. Benefit from streamlined platform installation and upgrades from one of the enterprise Kubernetes leaders.

Red Hat OpenShift overview video

Secure the software supply chain

Simplify DevSecOps by providing developers automated guardrails within their existing workflows. Red Hat Advanced Cluster Security integrates with your CI/CD pipelines and image registries to provide continuous image scanning and assurance. By shifting security left, vulnerable and misconfigured images can be remediated within the same developer environment with real-time feedback and alerts.

Protect the Kubernetes infrastructure

Whether deployed on-premises or in the cloud, Red Hat Advanced Cluster Security delivers advanced security capabilities to ensure the underlying Kubernetes infrastructure remains hardened and protected.  Red Hat Advanced Cluster Security continuously scans your environment against CIS benchmarks and other security best practices and prevents misconfigurations and threats to deliver comprehensive Kubernetes-native protection.

Defend the workloads

Hundreds of out-of-the-box deploy-time and runtime policies come standard with Red Hat Advanced Cluster Security to prevent risky workloads from being deployed or running.  Red Hat Advanced Cluster Security monitors, collects, and evaluates system-level events such as process execution, network connections and flows, and privilege escalation within each container in your Kubernetes environments. Combined with behavioral baselining and allowlisting, it detects anomalous activity indicative of malicious intent such as active malware, cryptomining, unauthorized credential access, intrusions, and lateral movement.

Why Red Hat Advanced Cluster Security?

Minimize operational risk

Align security with DevOps by using Kubernetes-native controls to mitigate threats and enforce security policies that minimize operational risk to your applications.

Accelerate DevOps productivity

Accelerate the pace of innovation by providing developers actionable and context-rich guardrails embedded into existing workflows and tooling that support developer velocity.

Reduce operational cost

Reduce the overall investment in time, effort, and personnel, and streamline security analysis, investigation, and remediation by using a common source of truth.

Key Features

Vulnerability management


Identify and fix vulnerabilities in both container images and Kubernetes across the entire software development life cycle.

Compliance


Audit your systems against CIS Benchmarks, NIST, PCI, and HIPAA, with interactive dashboards and one-click audit reports.

Network segmentation


Visualize existing network traffic and enforce tighter segmentation using Kubernetes-native controls to reduce your blast radius.

Risk profiling


See all your deployments ranked by risk level, using context from Kubernetes’ declarative data, to prioritize remediation.

Configuration management


Apply best practices to hardening your Kubernetes environments and workloads for a more secure and stable application.

Detection and response


Use rules, allowlists, and baselining to identify suspicious activity, and take action, to thwart attacks, using Kubernetes for enforcement.

Red Hat Advanced Cluster Security for Kubernetes

Read the Datasheet

Red Hat Advanced Cluster Security for Kubernetes

Introducing Red Hat Advanced Cluster Management for Kubernetes

Red Hat Advanced Cluster Management for Kubernetes enables organizations to manage their Kubernetes clusters with consistency across the hybrid cloud.

Learn more

Technologies supported by Red Hat OpenShift Container Platform

Red Hat OpenShift extends to databases, frameworks, and tools so your teams can move faster.

Istio

Prometheus

Jenkins

Node.js

Red Hat AMQ streams

Get a personalized demo tailored for your business, environment, and needs.

Request a demo