Today, ensuring the security and integrity of your software supply chain is more critical than ever. Red Hat Advanced Cluster Security for Kubernetes is focused on providing users the tools to tackle the greatest security challenges.
One essential tool in this effort is the software bill of materials (SBOM), which provides a comprehensive list of all components and libraries used within a software product. With the growing importance of SBOMs for supply chain security—especially in light of the NIST Executive Order—Red Hat Advanced Cluster Security 4.7 introduces new features for generating and analyzing SBOMs, providing users with deeper visibility and control. Red Hat Advanced Cluster Security 4.7 brings several other key updates, including EPSS scores for vulnerability prioritization, streamlined certificate management, and enhanced machine authentication integrations.
The product documentation contains the full list of updates and you can always try the newest product version by starting your free trial of Red Hat Advanced Cluster Security for Kubernetes today.
SBOM generation, Analyzed Type (Tech Preview)
A SBOM provides detailed lists of all components and libraries in a software product, allowing organizations and government agencies to know exactly what software they’re using. An SBOM is essential in customer supply chain security, especially with the announcement of the NIST Executive Order from 2021. As a technology preview in Red Hat Advanced Cluster Security 4.7, you can generate SBOMs from the command line or through the user interface (UI).
For SBOM users, it is essential to understand the benefits and limitations of different types of SBOMs. An SBOM is a great tool to add to your overall software supply chain security efforts, but it doesn't solve all hardening and security considerations.
User workload focus
Since the general availability of the Vulnerability Management Dashboard in Red Hat Advanced Cluster Security 4.5, we’ve prioritized simplifying and enhancing our user's workflows. In Red Hat Advanced Cluster Security 4.7, targeted views in the Vulnerability Management window promotes consistency across the product, and is critical in bridging the gap between user-facing software and platform management, as depicted in the User Workload vs Platform Views walkthrough below.
The Vulnerability Management Dashboard has a view of results containing:
- User Workloads
- Platform
- Nodes
- More Views
- All vulnerable images
- Inactive images
- Images without CVEs
- Kubernetes Components
This change provides information on issues you're trying to solve.
EPSS score
Red Hat Advanced Cluster Security 4.7 release brings exploit prediction scoring system (EPSS) scores to the Vulnerability Management dashboard. By enriching the ACS vulnerability management data, ACS provides a probability score in percentage (between 0 and 100%) produced by the EPSS framework, which highlights how probable it is for a particular vulnerability to be exploited. The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS scores enable security teams to prioritize vulnerabilities based on their likelihood of exploitation. EPSS scores are based on various factors, including the availability of exploit code, exploit trends and the prevalence of vulnerabilities in the wild. This extra information gives organizations another piece of information to manage the vulnerabilities in their clusters effectively.
Secure credential management
In Red Hat Advanced Cluster Security 4.7, the certificate renewal process for secured clusters has been streamlined with the automatic renewal of mTLS certificates for communication within secured clusters. This greatly simplifies management of your certificates.
This feature also creates separate credentials, called a Cluster Registration Secret (CRS), for the initial bootstrap scenario of a secured cluster. The previous initBundle installation process is being deprecated in favor of Cluster Registration Secret, which provides a clear separation of bootstrap credentials and certificates used for internal component communication. CRS can be easily revoked when not necessary without impacting functionality on the secured cluster.
Machine identity auth integrations
Red Hat Advanced Cluster Security 4.7 enables access and integration with Azure registry and Microsoft Sentinel using short-lived OpenID Connect (OIDC) credentials provided by Microsoft's Identity provider. These credentials are used for authenticating Red Hat Advanced Cluster Security services to Azure APIs. The Red Hat Advanced Cluster Security 4.4 release brought the framework to integrate with other cloud providers, such as AWS and GCP, via short-lived OIDC federated credentials, providing more secure communications.
EntraID for machine<>machine authentication
Red Hat Advanced Cluster Security now provides a way to allow machine<>machine authentication using Azure AD Service Principals that represent application identity.
In the Red Hat Advanced Cluster Security 4.3 release, API access was enabled for machine<>machine Auth with short-lived OIDC tokens. With this release, we document how OIDC Identity tokens from Microsoft EntraID can be exchanged for RHACS access tokens to authenticate to RHACS APIs and run automated tasks such as image scans and image checks.
Red Hat Developer Hub Plugin (Tech Preview)
Red Hat Developer Hub is a Red Hat build of the open source Backstage project designed to create customizable internal developer portals, improving developers' productivity. Red Hat Developer Hub provides enterprise-grade support with role-based access control plugins that simplify user management and supported Red Hat plugins.
Regarding plugins, the Red Hat Advanced Cluster Security plugin will be available in the Backstage community and can be installed on any developer platform based on Backstage. Providing consistent and targeted vulnerability information in your developers' dashboard will enable them to catch issues early in the development lifecycle and simplify communication between developers and your security teams.
GitHub Container Registry integration
The Red Hat Advanced Cluster Security for Kubernetes vulnerability scanner requires access to the registry where container images are hosted to produce vulnerability scan results.
To facilitate organizations that host their container images in ghcr.io, Red Hat Advanced Cluster Security now offers an out-of-the-box integration option for GitHub Container Registry (GHCR). This integration allows for integration with public or private instances of GHCR.
Try Red Hat Advanced Cluster Security 4.7 today
If you’re interested in learning more about Red Hat Advanced Cluster Security for Kubernetes or Red Hat Advanced Cluster Security for Kubernetes Cloud Service, you can take a free test drive.
저자 소개
유사한 검색 결과
쿠버네티스에 대한 자세한 내용
제품
다양한 시각으로 고객의 상황을 파악하고 이를 바탕으로 고객의 과제를 분석하여 종합적이고 비용 효율적인 솔루션을 통해 문제를 해결하도록 돕는 전략적인 조언자입니다.
자동화된 풀스택 오퍼레이션으로 하이브리드 클라우드, 멀티클라우드 및 엣지 배포를 관리하는 엔터프라이즈급 쿠버네티스 컨테이너 플랫폼입니다.
관련 문서
리소스
e-book
O’Reilly: 클라우드 네이티브 애플리케이션 설계를 위한 쿠버네티스 패턴
체크리스트
쿠버네티스 배포를 위한 10가지 고려 사항
자세히 알아보기
교육
무료 교육 과정
Containers, Kubernetes and Red Hat OpenShift Technical Overview
무료 교육 과정
Developing Cloud-Native Applications with Microservices Architectures
무료 교육 과정
Running Containers with Red Hat Technical Overview
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
오리지널 쇼
엔터프라이즈 기술 분야의 제작자와 리더가 전하는 흥미로운 스토리
제품
- Red Hat Enterprise Linux
- Red Hat OpenShift Enterprise
- Red Hat Ansible Automation Platform
- 클라우드 서비스
- 모든 제품 보기
툴
체험, 구매 & 영업
커뮤니케이션
Red Hat 소개
Red Hat은 Linux, 클라우드, 컨테이너, 쿠버네티스 등을 포함한 글로벌 엔터프라이즈 오픈소스 솔루션 공급업체입니다. Red Hat은 코어 데이터센터에서 네트워크 엣지에 이르기까지 다양한 플랫폼과 환경에서 기업의 업무 편의성을 높여 주는 강화된 기능의 솔루션을 제공합니다.