Chapter 1. Red Hat Advanced Cluster Security for Kubernetes 4.10
Red Hat Advanced Cluster Security for Kubernetes (RHACS) is an enterprise-ready, Kubernetes-native container security solution that protects your vital applications across the build, deploy, and runtime stages of the application lifecycle.
RHACS deploys into your infrastructure and integrates with your DevOps tools and workflows. This integration provides better security and compliance, enabling DevOps and InfoSec teams to operationalize security.
1.1. Release dates Copy linkLink copied to clipboard!
Review the official release dates and update schedule for RHACS 4.10.
| RHACS version | Released on |
|---|---|
|
| 3 March 2026 |
|
| 8 April 2026 |
1.2. About release 4.10 Copy linkLink copied to clipboard!
RHACS 4.10 includes new features, improvements, and updates.
1.3. New features Copy linkLink copied to clipboard!
To strengthen your security posture, implement the new configuration and monitoring standards in RHACS 4.10. You can configure global node taints, define standardized base images, and monitor file activity to support strict workload isolation and compliance. When you register new secured clusters, select the cluster registration secret (CRS) method instead of an init bundle to securely isolate your bootstrapping credentials.
This release adds improvements related to the following components and concepts:
1.3.1. Automatic HTTP to HTTPS redirection for Central URLs Copy linkLink copied to clipboard!
In RHACS 4.10, you are automatically redirected from HTTP to HTTPS when accessing the Central URL. Before this update, the system did not automatically redirect HTTP requests. As a result, this enhancement improves security, user experience, and consistency with Red Hat OpenShift platform standards.
For example, if you enter http://central-stackrox.apps.ocp.example.com, Central automatically redirects the connection to https://central-stackrox.apps.ocp.example.com.
1.3.2. Global node taints and tolerations in custom resources Copy linkLink copied to clipboard!
In RHACS 4.10, you can configure global node taints and tolerations within both the Central and Secured Cluster custom resources (CRs). When you define these once at the CR level, the system automatically applies your settings to all RHACS components that run as Kubernetes deployments.
Before this update, you had to duplicate configurations for environments by using tainted or dedicated node pools. With this update, you ensure consistent scheduling behavior across your Central services and secured cluster components, which provides greater flexibility when you deploy RHACS into clusters with strict workload isolation policies.
For more information, see Central configuration options in the RHACS installation documentation.
1.3.3. Standardized base image definition and layer detection Copy linkLink copied to clipboard!
In RHACS 4.10, you can define standardized base images that your organization has approved for application development. When you use these images, RHACS detects and distinguishes the layers originating from the base image from those added by the application owner.
This new capability establishes a clear separation of duties between base image owners and application owners. This structure ensures clear accountability and faster remediation while enabling more exact patch responsiveness metrics for each team.
For more information about base image definition, see "Defining base images used in application development".
For more information about viewing vulnerabilities from base images, see "Viewing vulnerabilities from base images".
1.3.4. Vulnerability management for virtual machine workloads (Technology Preview) Copy linkLink copied to clipboard!
In RHACS 4.10, RHACS supports vulnerability management of virtual machine (VM) workloads at runtime on Red Hat OpenShift Virtualization (RHOCPV). This feature requires you to run a VM agent, which performs continuous package scanning from inside the VM. As a result, you gain visibility into vulnerabilities within your virtualized workloads. This capability is a Technology Preview feature.
For more information, see "Scanning virtual machines".
1.3.5. OpenShift console dynamic security plugin (Technology Preview) Copy linkLink copied to clipboard!
In RHACS 4.10, you gain access to a new dynamic plugin for the OpenShift console on your secured clusters. This plugin adds a Security tab that displays real-time vulnerability information about your cluster. You can now analyze vulnerability data directly within your OpenShift console interface without switching applications. This capability is a Technology Preview feature.
For more information, see "Accessing vulnerability information in the OpenShift Container Platform web console".
1.3.6. Policy criteria for CVE fix availability Copy linkLink copied to clipboard!
In RHACS 4.10, teams can allow violation grace periods based on the date a fix became available for a published vulnerability.
1.3.7. Administrative events for scan failures Copy linkLink copied to clipboard!
In RHACS 4.10, the roxctl CLI and API requests that trigger image scans now generate administrative events when scanning fails. As a result, administrators gain better visibility into scanning reliability and failures.
1.3.8. Cluster registration secret for secure bootstrapping Copy linkLink copied to clipboard!
In RHACS 4.10, the cluster registration secret (CRS), introduced in RHACS 4.9 as a Technology Preview, is fully supported with this release. Additionally, you can now use this method when installing by using the Operator. CRS provides a means to securely bootstrap secured cluster registration with RHACS Central. This method replaces the init bundle for registration.
CRS provides clear separation of credentials used for bootstrapping registration of secured cluster components from the workflow of internal communication between these components. Existing clusters that used the init bundle for registration are not impacted. However, you should use CRS for new cluster registrations.
For more information, see the RHACS installation documentation.
1.3.9. File activity monitoring (Technology Preview) Copy linkLink copied to clipboard!
In RHACS 4.10, file activity monitoring provides real-time visibility into file execution and modifications. Different security standards such as PCI-DSS specify requirements for ensuring file integrity that traditional solutions such as the File Integrity Operator could not fully meet. As a result, this feature bridges visibility gaps by capturing the timestamp, process name, execution path, and UID for every change. It distinguishes between host and container initiated changes and automatically maps activity to specific Kubernetes deployments and namespaces.
You can scope deployment policies to filter out expected activity and tune policies for relevant file operations. Enable this feature per cluster by using the Operator options or the Helm installation. In this release, you can monitor the four most critical paths of a node. This capability is a Technology Preview feature.
For more information, see "Configuring file activity monitoring".
1.3.10. Enhanced status output for Central and secured cluster resources Copy linkLink copied to clipboard!
In RHACS 4.10, when you install RHACS by using the Operator, the output for the oc get central and oc get securedcluster commands provides key information fields, including the software version and immediate visibility into resource health and operational detail. As a result, administrators can more quickly assess and confirm if the resource is currently processing or is fully operational.
1.4. Notable technical changes Copy linkLink copied to clipboard!
This release includes notable technical changes.
This release has the following changes:
- Node.js version update for user interface
- The UI folder requires Node.js version 22.13.0.
- Lower limit reduction for parallel image scan variable
-
The lower limit for the
ROX_MAX_PARALLEL_IMAGE_SCAN_INTERNALenvironment variable on Sensor decreases to1from10. You can now configure a single parallel image scan if necessary.
- Operator adoption of secrets without owner references
-
The Operator adopts secrets that include the
app.stackrox.io/managed-by: operatorlabel but lackownerReferences. This behavior resolves reconciliation failures that occurred when backup and restore operations strippedownerReferencesfrom secrets.
- Removal of certificate initialization container
-
The
init-tls-certsinit container is removed from all secured cluster services and is no longer supported. Sensor performs the certificate initialization logic at startup.
- Removal of Sensor certificate distribution API
-
The Sensor
certdistributionAPI is removed and is no longer supported. The admission controller earlier used this API to retrieve its Transport Layer Security (TLS) certificate from Sensor, but this mechanism is no longer necessary.
- Upgrade path requirements for versions earlier than 4.6
- Direct upgrades from versions earlier than RHACS 4.6 are not supported. To upgrade to version 4.10 from a version earlier than 4.6, you must first upgrade to 4.6, 4.7, 4.8, or 4.9. Rollbacks to versions earlier than 4.6 from version 4.10 or later are not supported.
- Risk page redesign in PatternFly
- You can access the redesigned Risk page in the RHACS portal. The interface is updated across all views, pages, and menus, but the functionality remains the same.
1.5. Deprecated and removed features Copy linkLink copied to clipboard!
Identify the deprecated and removed features in RHACS 4.10 to ensure your deployment remains secure and fully functional.
Some features available in earlier releases have been deprecated or removed.
Deprecated functionality is still included in RHACS and continues to be supported; however, it will be removed in a future release of this product and is not recommended for new deployments.
For the most recent list of major functionality deprecated and removed, see the following table. Information about additional removed or deprecated functionality is available after the table.
In the table, features are marked with the following statuses:
- GA: General Availability
- TP: Technology Preview
- DEP: Deprecated
- REM: Removed
- NA: Not applicable
| Feature | RHACS 4.8 | RHACS 4.9 | RHACS 4.10 |
|---|---|---|---|
| Admission controller configuration parameters:
| GA | GA | DEP |
| API token authentication for Red Hat OpenShift Cluster Manager | DEP | DEP | DEP |
| Collections hierarchical implementation | GA | GA | DEP |
| Compliance dashboard | NA | DEP | DEP |
|
| DEP | DEP | DEP |
| Google Container Registry integration | DEP | DEP | DEP |
| GraphQL endpoints | GA | GA | DEP |
| Kernel support packages and driver download functionality | DEP | DEP | DEP |
| Reporting of Istio vulnerabilities | DEP | DEP | DEP |
|
| GA | GA | DEP |
| Scanner V2 | DEP | DEP | DEP |
|
| DEP | DEP | DEP |
|
| DEP | DEP | DEP |
|
| DEP | DEP | DEP |
|
| DEP | DEP | DEP |
| Vulnerability Management (1.0) menu item | DEP | DEP | DEP |
| Vulnerability Report Creator permission | DEP | DEP | DEP |
| Init Bundle | GA | GA | DEP |
|
| GA | GA | DEP |
|
| GA | GA | DEP |
| Configuration Management Dashboard and sub-menus | GA | GA | DEP |
| OpenShift auth identity provider | GA | GA | DEP |
| Compliance V1 | GA | GA | DEP |
|
| DEP | DEP | REM |
| Active vulnerability management feature | DEP | DEP | REM |
|
| DEP | DEP | REM |
|
| DEP | DEP | REM |
| Graph view in the Process discovery tab | GA | GA | DEP |
| Vulnerability reports using attached collections | GA | GA | DEP |
| Vulnerability Management Dashboard (1.0) and sub-menus | GA | GA | DEP |
| Install-time Istio integration | GA | GA | DEP |
| Kubernetes components view | GA | GA | DEP |
|
Manifest install method and the related | GA | DEP | DEP |
- Deprecated features
- Manifest install method and related API
-
The manifest install method and the related
/v1/clustersAPI, which deployed and managed clusters, is deprecated and is anticipated to be removed in a future release. - Init Bundle
-
The Init Bundle feature, which registers secured clusters with RHACS Central, is deprecated and is anticipated to be removed in a future release. The associated APIs
/v1/cluster-init/init-bundles/revokeand/v1/cluster-init/init-bundlesare also deprecated. You can register new clusters by using the cluster registration secret (CRS) instead. - Configuration Management Dashboard and sub-menus
- The Configuration Management Dashboard and all of its sub-menus, which provided security configuration data, are deprecated and are anticipated to be removed in a future release. API access for Secrets or role-based access control (RBAC) information remains available. Security configuration data integrates directly into risk and policy management workflows to enhance visibility without relying on a standalone dashboard.
- OpenShift auth identity provider
- The OpenShift auth identity provider, which served as an identity provider (IdP) for RHACS, is deprecated and is anticipated to be removed in a future release. You can authenticate users by using OpenID Connect (OIDC) IdP integrations instead.
- Compliance V1
The Compliance V1 functionality, including the Compliance Dashboard, compliance APIs, and compliance configuration management board, which provided the earlier compliance implementation, is deprecated and is anticipated to be removed in a future release.
This includes NIST SP 800-190 and HIPAA benchmarks, as they are currently not supported by the Compliance Operator and are anticipated to be removed in a future release at the same time as the Compliance V1 implementation. Additionally, Compliance support for non-OpenShift Kubernetes distributions is deprecated and is anticipated to be removed in a future release. If you rely on this functionality, you should prepare for a loss of functionality.
For clusters running OpenShift, you can access improved compliance features by using the new compliance version instead.
- Graph view in the Process discovery tab
- The Graph view, within the Risk section of the Event Timeline in the Process discovery tab, is deprecated and is anticipated to be removed in a future release.
- Scanner V2
- Starting with RHACS 4.6, Scanner V2, also known as StackRox Scanner is deprecated and is anticipated to be removed in a future release. To maintain supported vulnerability scanning capabilities and access the latest security features, you should migrate to Scanner V4.
- Vulnerability reports by using attached collections
- The vulnerability reports by using attached collections, which provided report scoping through hierarchical relationships, are deprecated and are anticipated to be removed in a future release. You can prepare for future updates to the scoping mechanism by avoiding attached collections.
- Vulnerability Management Dashboard (1.0) and sub-menus
- Starting with RHACS 4.3, the Vulnerability Management Dashboard (1.0) and all of its sub-menus, which provided traditional vulnerability management views, are deprecated and is anticipated to be removed in a future release. You can access vulnerability information by using the current Vulnerability Management Dashboard instead.
- Install-time Istio integration
-
The creation of
networking.istio.io/v1alpha3/DestinationRuleresources by RHACS installation, which automatically generated networking configurations during setup, is deprecated and is anticipated to be removed in a future release. You can manage Istio configurations by creatingDestinationRuleresources out-of-band instead. - Kubernetes components view
-
The Kubernetes components view available in the RHACS portal at Vulnerability Management
Results More Views is deprecated and is anticipated to be removed in a future release.
- Removed features
/v1/cve/requestsAPIs-
The
/v1/cve/requestsAPIs, which managed vulnerability exceptions, are removed and are no longer supported. You can manage vulnerability exceptions by using the/v2/vulnerability-exceptions/APIs instead. - Active vulnerability management
- The active vulnerability management feature, which provided traditional vulnerability handling, is removed and is no longer supported. You can manage vulnerabilities by using the standard vulnerability management workflow instead.
/v1/imagecves/suppressand/v1/imagecves/unsuppressAPIs-
The
/v1/imagecves/suppressand/v1/imagecves/unsuppressAPIs, which suppressed and unsuppressed image CVEs, are removed and are no longer supported. You can manage vulnerability exceptions by using the/v2/vulnerability-exceptions/APIs instead.
1.6. Bug fixes in version 4.10.0 Copy linkLink copied to clipboard!
This release has bug fixes and enhancements.
- Before this update, a stale endpoint in your declarative M2M configuration could cause Central to hoard database connections. This often caused performance issues when endpoints became unreachable. With this release, the system now automatically rolls back database connections after creating a token exchanger or if the creation process fails. As a result, you no longer experience DB connection hoarding caused by stale M2M endpoints.
-
Before this update, you might have noticed slower response times because the image data store shifted from partial to full query fetching. This release optimizes the query method by transitioning from
SearchtoWalk. This change improves your image search speed and overall response time while maintaining high security standards.
- Before this update, conflicting casing requirements between the controller and the user interface (UI) caused you to see duplicate policy categories in the dashboard. We have synchronized the casing validation across both interfaces. You can now see a clean, unified list of policy categories without duplicates.
-
Before this update, you could only view port numbers in the Network Policy dashboard, as port names were not supported in the UI. We have updated the visualization to fully support and display port names. You can now easily identify and manage
NetworkPoliciesby their assigned names, providing better visibility into your network configurations.
1.7. Bug fixes in version 4.10.1 Copy linkLink copied to clipboard!
This release provides the following bug fixes:
- Before this update, admission controller webhooks made unnecessary requests to fetch image scan data even when no enforced policies required image enrichment data evaluation, which reduced throughput. With this release, Red Hat has optimized the admission controller to skip image fetch requests when either there are no enforced policies that require image enrichment data or when an enforced policy that does not require image enrichment data blocks the review request. As a result, admission controller webhook throughput has improved.
- Before this update, images with empty names were improperly uploaded, causing global search to return blank image results. With this release, empty-named images no longer appear in search results.
- Before this update, the script failed to run on a Linux system due to missing executable program permissions, causing user interface elements to display incorrectly. With this release, Red Hat corrected the issue with inaccurate data processing in the report generator. As a result, the system no longer hangs during data transfer.
- Before this update, missing executable permissions prevented the script from running on Linux, which caused user interface elements to display incorrectly. With this release, the update corrects the inaccurate data processing in the report generator. As a result, the system transfers data without hanging.
- Before this update, selected execution paths in Sensor did not check whether the cluster entities store history enabled or disabled the history feature. This caused an issue where Sensor allocated memory that was never used for clusters with enabled history. With this release, Red Hat has added a check for cluster entities history to prevent unnecessary storage. As a result, the system maintains optimal memory usage because it no longer stores unnecessary items in the cluster entities store history.
-
Before this update, the
endpointsStore.addToHistoryfunction performed unnecessary operations, which increased sensor CPU load and elevated event-processing latency in larger clusters. With this release, Red Hat has improved CPU efficiency inendpointsStoremutations to reduce latency. As a result, the system processes events faster and maintains lower CPU usage in large clusters with many endpoints.
- Before this update, File Activity Monitoring did not generate node violations when you accessed monitored files by using sudo privileges. With this release, Red Hat has corrected the issue to properly detect and report file access violations regardless of privilege escalation. As a result, node violations are now generated for all file access to monitored paths.
- Before this update, Helm charts did not configure image pull secrets for the Scanner service account when you disabled Scanner V4 and used only Scanner V2. This caused Scanner images to fail to pull. With this release, Red Hat has corrected the Helm chart configuration to properly inject image pull secrets into the Scanner service account. As a result, Scanner images pull successfully in all configurations.
1.8. Known issues in version 4.10.1 Copy linkLink copied to clipboard!
This release has the following known issues:
OpenShift Container Platform 4.22 dropped
PatternFly5 support, causing runtime issues with the plugin in OpenShift Container Platform 4.21 and later versions. As a consequence, you encounter runtime issues due to the disabled plugin.To work around this problem, Red Hat has updated the Red Hat OpenShift version list for the dynamic plugin in versions 4.19, 4.20, and 4.21, disabling
PatternFly5 in OpenShift Container Platform 4.21 and later versions. As a result, this avoids runtime issues.
The Helm chart linter incorrectly rejected valid reencrypt route configurations that specified both
central.spec.central.exposure.route.reencrypt.tls.certificateandcentral.spec.central.exposure.route.reencrypt.tls.keyparameters. As a consequence, you encounter Operator validation errors even when both parameters were correctly provided, causing the Operator to crash loop.No known workaround exists.
1.9. Image versions Copy linkLink copied to clipboard!
You can manually pull, retag, and push Red Hat Advanced Cluster Security for Kubernetes (RHACS) images to your registry. The current version includes the following images:
| Image | Description | Current version |
|---|---|---|
| Main |
Includes Central, Sensor, Admission controller, and Compliance components. Also includes |
|
| Central DB | PostgreSQL instance that provides the database storage for Central. |
|
| Scanner | Scans images and nodes. |
|
| Scanner DB | Stores image scan results and vulnerability definitions. |
|
| Scanner V4 | Scans images. |
|
| Scanner V4 DB | Stores image scan results and vulnerability definitions for Scanner V4. |
|
| Collector | Collects runtime activity in Kubernetes or OpenShift Container Platform clusters. |
|