Red Hat Advanced Cluster Security for Kubernetes
Cloud-native applications require advanced security controls
Protecting cloud-native applications requires significant changes in how we approach security—we must apply controls earlier in the application development life cycle, use the infrastructure itself to apply controls, and keep up with increasingly rapid release schedules.
Red Hat® Advanced Cluster Security for Kubernetes, powered by StackRox technology, protects your vital applications across build, deploy, and runtime. Our software deploys in your infrastructure and integrates with your DevOps tooling and workflows to deliver better security and compliance. The policy engine includes hundreds of built-in controls to enforce DevOps and security best practices, industry standards such as CIS Benchmarks and National Institute of Standards Technology (NIST) guidelines, configuration management of both containers and Kubernetes, and runtime security.
Red Hat Advanced Cluster Security for Kubernetes provides a Kubernetes-native architecture for container security, enabling DevOps and InfoSec teams to operationalize security.
Features and benefits of Red Hat Advanced Cluster Security for Kubernetes
Kubernetes-native security:
- Increases protection.
- Eliminates blind spots, providing staff with insights into critical vulnerabilities and threat vectors.
- Reduces time and costs.
- Reduces the time and effort needed to implement security and streamlines security analysis, investigation, and remediation using the rich context Kubernetes provides.
- Increases scalability and portability.
- Provides scalability and resiliency native to Kubernetes, avoiding operational conflict and complexity that can result from out-of-band security controls.
Detailed benefits
Area | Benefits |
Visibility |
|
Vulnerability management |
|
Compliance |
|
Network segmentation |
|
Risk profiling |
|
Configuration management |
|
Runtime detection and response |
|
Integrations |
|