The Red Hat Advanced Cluster Security for Kubernetes team continues to build on its 4.0 release earlier this year, with a user-driven release in Red Hat Advanced Cluster Security 4.3. This release focuses on supporting even more Kubernetes platforms, and delivers better vulnerability reports, while onboarding users quickly and more. The Red Hat Advanced Cluster Security 4.3 release notes contain the many updates, depreactions and removal of features in the product.

Take a look at the updates in Red Hat Advanced Cluster Security 4.3:

  • Vulnerability reporting 2.0 is generally available
  • Watch and scan images in Vulnerability Management 2.0
  • Increased support for hardware and software
  • Scan local image registries by using the roxctl CLI
  • Easily invite users to your Red Hat Advanced Cluster Security instance

As always, you can try out the latest version of Red Hat Advanced Cluster Security with the 60 day, no cost trial of Red Hat Advanced Cluster Security Cloud Service.

Vulnerability Reporting 2.0 is generally available

The team is excited to announce that the Vulnerability Reporting option under the Vulnerability Management menu is now generally available. This vulnerability reporting capability upgrade builds on the release of Red Hat Advanced Cluster Security 4.0 and the Vulnerability Management 2.0 dashboard.

Screenshot of the RHACS Create report detail tab

The reporting options enable security teams to send weekly or monthly updates to groups with collections based on the apps and services they develop and maintain. There are several enhancements, including the ability to customize email templates and on-demand send of vulnerability reports. For more information, see “Vulnerability Reporting.”

Screenshot of the RHACS Edit email template dialog

One thing to note! All reports created in the Vulnerability Management 1.0 reporting page are automatically migrated to the Vulnerability Management 2.0 menu. For more information, see  “Migration of vulnerability reports when upgrading to RHACS version 4.3 and later.

Watch and scan images in Vulnerability Management 2.0

Red Hat Advanced Cluster Security prioritizes container images that are being used in your cluster. However, some container images have a short lifespan or are used periodically. Red Hat Advanced Cluster Security has been able to mark an image as “watched” so that vulnerability scans can always be completed regardless of whether the image is used in an active deployment.

Workload CVEs list

This functionality has been migrated from Vulnerability Management 1.0 to Vulnerability Management 2.0. For more information, see “Scanning inactive images.

Increased support for hardware and software

Red Hat Advanced Cluster Security continues to help our customers secure their hosts, platform and container workloads. This means supporting a wide range of Kubernetes versions for our Central and Secured Cluster services.

With 4.3, we’re announcing support for the following hardware and software:

For more information, see “Supported platforms and installation methods.”

Scan local image registries by using the roxctl command line interface (CLI)

Red Hat Advanced Cluster Security first enabled scanning locally and in the pipeline with the roxctl CLI. We are taking it further and enabling users to scan images stored in image registries, including cluster local registries such as the OpenShift integrated image registry.

For more information, see “Image scanning using the roxctl CLI.

NEW! Red Hat Advanced Cluster Security Event Log Viewer 

We’ve added a UI section to easily filter through the Red Hat Advanced Cluster Security events:

New UI section to easily filter through the Red Hat Advanced Cluster Security events

Easily invite users to your Red Hat Advanced Cluster Security instance

Security dashboards are only as powerful as your ability to share them with your team. With Red Hat Advanced Cluster Security, you can invite multiple new users with a simple email.

Screenshot of the RHACS Invite users dialog

As always, you can define your user's roles to simplify accurate access control and improve the security of your Red Hat Advanced Cluster Security instance.

For more information, see “Inviting users to your RHACS instance.” 

Try Red Hat Advanced Cluster Security 4.3 at no cost today!

Red Hat Advanced Cluster Security Cloud Service makes getting started a breeze and comes with a 60-day, no cost trial. Sign up and get hands-on with Red Hat Advanced Cluster Security today!


Sobre o autor

Michael Foster is a CNCF Ambassador, the Community Lead for the open source StackRox project, and Principal Product Marketing Manager for Red Hat based in Toronto. In addition to his open source project responsibilities, he utilizes his applied Kubernetes and container experience with Red Hat Advanced Cluster Security to help organizations secure their Kubernetes environments. With StackRox, Michael hopes organizations can leverage the open source project in their Kubernetes environments and join the open source community through stackrox.io. Outside of work, Michael enjoys staying active, skiing, and tinkering with his various mechanical projects at home. He holds a B.S. in Chemical Engineering from Northeastern University and CKAD, CKA, and CKS certifications.

UI_Icon-Red_Hat-Close-A-Black-RGB

Navegue por canal

automation icon

Automação

Últimas novidades em automação de TI para empresas de tecnologia, equipes e ambientes

AI icon

Inteligência artificial

Descubra as atualizações nas plataformas que proporcionam aos clientes executar suas cargas de trabalho de IA em qualquer ambiente

open hybrid cloud icon

Nuvem híbrida aberta

Veja como construímos um futuro mais flexível com a nuvem híbrida

security icon

Segurança

Veja as últimas novidades sobre como reduzimos riscos em ambientes e tecnologias

edge icon

Edge computing

Saiba quais são as atualizações nas plataformas que simplificam as operações na borda

Infrastructure icon

Infraestrutura

Saiba o que há de mais recente na plataforma Linux empresarial líder mundial

application development icon

Aplicações

Conheça nossas soluções desenvolvidas para ajudar você a superar os desafios mais complexos de aplicações

Virtualization icon

Virtualização

O futuro da virtualização empresarial para suas cargas de trabalho on-premise ou na nuvem