Foundations of container-level security with Red Hat Advanced Cluster Security for Kubernetes

Red Hat® Advanced Cluster Security for Kubernetes is a Kubernetes-native security platform that enables you to build, deploy, and run cloud-native applications with more security. This learning path guides you through the reasons, methods, and tools used to protect workloads on Kubernetes. It includes reading materials, videos, and a live hands-on demo. 

This learning path is for system administrators, security practitioners, or DevSecOps teams
Developers may want to check out “Develop containers using Kubernetes” on developers.redhat.com. 

Get started on developers.redhat.com

What is security for containers?

10 mins

Container security involves defining build, deployment, and runtime practices to protect a Linux® container. Given that so much happens within and outside of the containers, security measures must be continuous and support your organization’s overall security strategies.

Applying security to Kubernetes containers will build on various outputs including deployments, pods, policies, etc. 

What will you learn?

  • Security concepts for containers and Kubernetes

What you need before starting:

  • Nothing, use this as a resource

Container security

Container security is not just one thing to be implemented, but rather it spans across multiple points in the development cycle. Think of applying security measures to ensure your supply chain, where the supply chain is your content and code traveling through your containers. With this in mind, there are several key areas to consider for security needs:

Container images

The first and most basic component of containers is the layers of files they are created out of, called container images. The base images that are used as a starting point for creating other images must be secured as a trusted resource first and foremost. A good security measure is to ensure that this image comes from a known open source group, hosted on a reputable registry, and has all source code available. On top of these precautions, container images should be scanned on a regular cadence to look out for any modifications that could compromise your overall workflows.

Access management

Another important security rule is checking that your team has the permissions they need to access the container images, as well as preventing anyone who shouldn’t. Role-based assignments in particular can be effective in mitigating any potential human errors that may result in vulnerabilities to your images.

Automated testing and deployment

After a build is completed, they should be managed according to Center for Internet Security (CIS) standards. This can be pursued through automated policies designed to raise flags with any security issues or vulnerabilities found in the build.

These options can enable your organization to secure your containers and workloads more easily. Now that you have a grasp as to what security measures can be applied to your containers, next we’ll learn the specifics of each as it applies to Kubernetes. 

Red Hat logoGithubredditYoutubeTwitter

Formazione

Prova, acquista e vendi

Community

Informazioni sulla documentazione di Red Hat

Aiutiamo gli utenti Red Hat a innovarsi e raggiungere i propri obiettivi con i nostri prodotti e servizi grazie a contenuti di cui possono fidarsi. Esplora i nostri ultimi aggiornamenti.

Rendiamo l’open source più inclusivo

Red Hat si impegna a sostituire il linguaggio problematico nel codice, nella documentazione e nelle proprietà web. Per maggiori dettagli, visita il Blog di Red Hat.

Informazioni su Red Hat

Forniamo soluzioni consolidate che rendono più semplice per le aziende lavorare su piattaforme e ambienti diversi, dal datacenter centrale all'edge della rete.

Theme

© 2026 Red Hat
Torna in cima