Foundations of container-level security with Red Hat Advanced Cluster Security for Kubernetes

Red Hat® Advanced Cluster Security for Kubernetes is a Kubernetes-native security platform that enables you to build, deploy, and run cloud-native applications with more security. This learning path guides you through the reasons, methods, and tools used to protect workloads on Kubernetes. It includes reading materials, videos, and a live hands-on demo. 

This learning path is for system administrators, security practitioners, or DevSecOps teams
Developers may want to check out “Develop containers using Kubernetes” on developers.redhat.com. 

Get started on developers.redhat.com

What is security for containers?

10 mins

Container security involves defining build, deployment, and runtime practices to protect a Linux® container. Given that so much happens within and outside of the containers, security measures must be continuous and support your organization’s overall security strategies.

Applying security to Kubernetes containers will build on various outputs including deployments, pods, policies, etc. 

What will you learn?

  • Security concepts for containers and Kubernetes

What you need before starting:

  • Nothing, use this as a resource

Container security

Container security is not just one thing to be implemented, but rather it spans across multiple points in the development cycle. Think of applying security measures to ensure your supply chain, where the supply chain is your content and code traveling through your containers. With this in mind, there are several key areas to consider for security needs:

Container images

The first and most basic component of containers is the layers of files they are created out of, called container images. The base images that are used as a starting point for creating other images must be secured as a trusted resource first and foremost. A good security measure is to ensure that this image comes from a known open source group, hosted on a reputable registry, and has all source code available. On top of these precautions, container images should be scanned on a regular cadence to look out for any modifications that could compromise your overall workflows.

Access management

Another important security rule is checking that your team has the permissions they need to access the container images, as well as preventing anyone who shouldn’t. Role-based assignments in particular can be effective in mitigating any potential human errors that may result in vulnerabilities to your images.

Automated testing and deployment

After a build is completed, they should be managed according to Center for Internet Security (CIS) standards. This can be pursued through automated policies designed to raise flags with any security issues or vulnerabilities found in the build.

These options can enable your organization to secure your containers and workloads more easily. Now that you have a grasp as to what security measures can be applied to your containers, next we’ll learn the specifics of each as it applies to Kubernetes. 

Red Hat logoGithubredditYoutubeTwitter

詳細情報

試用、購入および販売

コミュニティー

会社概要

Red Hat は、企業がコアとなるデータセンターからネットワークエッジに至るまで、各種プラットフォームや環境全体で作業を簡素化できるように、強化されたソリューションを提供しています。

多様性を受け入れるオープンソースの強化

Red Hat では、コード、ドキュメント、Web プロパティーにおける配慮に欠ける用語の置き換えに取り組んでいます。このような変更は、段階的に実施される予定です。詳細情報: Red Hat ブログ.

Red Hat ドキュメントについて

Legal Notice

Theme

© 2026 Red Hat
トップに戻る