The Red Hat Advanced Cluster Security for Kubernetes team continues to build on its 4.0 release earlier this year, with a user-driven release in Red Hat Advanced Cluster Security 4.3. This release focuses on supporting even more Kubernetes platforms, and delivers better vulnerability reports, while onboarding users quickly and more. The Red Hat Advanced Cluster Security 4.3 release notes contain the many updates, depreactions and removal of features in the product.

Take a look at the updates in Red Hat Advanced Cluster Security 4.3:

  • Vulnerability reporting 2.0 is generally available
  • Watch and scan images in Vulnerability Management 2.0
  • Increased support for hardware and software
  • Scan local image registries by using the roxctl CLI
  • Easily invite users to your Red Hat Advanced Cluster Security instance

As always, you can try out the latest version of Red Hat Advanced Cluster Security with the 60 day, no cost trial of Red Hat Advanced Cluster Security Cloud Service.

Vulnerability Reporting 2.0 is generally available

The team is excited to announce that the Vulnerability Reporting option under the Vulnerability Management menu is now generally available. This vulnerability reporting capability upgrade builds on the release of Red Hat Advanced Cluster Security 4.0 and the Vulnerability Management 2.0 dashboard.

Screenshot of the RHACS Create report detail tab

The reporting options enable security teams to send weekly or monthly updates to groups with collections based on the apps and services they develop and maintain. There are several enhancements, including the ability to customize email templates and on-demand send of vulnerability reports. For more information, see “Vulnerability Reporting.”

Screenshot of the RHACS Edit email template dialog

One thing to note! All reports created in the Vulnerability Management 1.0 reporting page are automatically migrated to the Vulnerability Management 2.0 menu. For more information, see  “Migration of vulnerability reports when upgrading to RHACS version 4.3 and later.

Watch and scan images in Vulnerability Management 2.0

Red Hat Advanced Cluster Security prioritizes container images that are being used in your cluster. However, some container images have a short lifespan or are used periodically. Red Hat Advanced Cluster Security has been able to mark an image as “watched” so that vulnerability scans can always be completed regardless of whether the image is used in an active deployment.

Workload CVEs list

This functionality has been migrated from Vulnerability Management 1.0 to Vulnerability Management 2.0. For more information, see “Scanning inactive images.

Increased support for hardware and software

Red Hat Advanced Cluster Security continues to help our customers secure their hosts, platform and container workloads. This means supporting a wide range of Kubernetes versions for our Central and Secured Cluster services.

With 4.3, we’re announcing support for the following hardware and software:

For more information, see “Supported platforms and installation methods.”

Scan local image registries by using the roxctl command line interface (CLI)

Red Hat Advanced Cluster Security first enabled scanning locally and in the pipeline with the roxctl CLI. We are taking it further and enabling users to scan images stored in image registries, including cluster local registries such as the OpenShift integrated image registry.

For more information, see “Image scanning using the roxctl CLI.

NEW! Red Hat Advanced Cluster Security Event Log Viewer 

We’ve added a UI section to easily filter through the Red Hat Advanced Cluster Security events:

New UI section to easily filter through the Red Hat Advanced Cluster Security events

Easily invite users to your Red Hat Advanced Cluster Security instance

Security dashboards are only as powerful as your ability to share them with your team. With Red Hat Advanced Cluster Security, you can invite multiple new users with a simple email.

Screenshot of the RHACS Invite users dialog

As always, you can define your user's roles to simplify accurate access control and improve the security of your Red Hat Advanced Cluster Security instance.

For more information, see “Inviting users to your RHACS instance.” 

Try Red Hat Advanced Cluster Security 4.3 at no cost today!

Red Hat Advanced Cluster Security Cloud Service makes getting started a breeze and comes with a 60-day, no cost trial. Sign up and get hands-on with Red Hat Advanced Cluster Security today!