Foundations of container-level security with Red Hat Advanced Cluster Security for Kubernetes

Red Hat® Advanced Cluster Security for Kubernetes is a Kubernetes-native security platform that enables you to build, deploy, and run cloud-native applications with more security. This learning path guides you through the reasons, methods, and tools used to protect workloads on Kubernetes. It includes reading materials, videos, and a live hands-on demo. 

This learning path is for system administrators, security practitioners, or DevSecOps teams
Developers may want to check out “Develop containers using Kubernetes” on developers.redhat.com. 

Get started on developers.redhat.com

What is Kubernetes security?

10 mins

Securing the orchestration platform for those containers is just as important as securing the containers themselves. Kubernetes (K8s or Kube), is an open source orchestration platform that can automate deployment, management, and scaling of containerized applications.

Using Kubernetes as your orchestration platform allows for a few built-in security options including:

  • Security checks performed during runtime and fixed at build stage
  • Segmentation of pods or groups of pods by network policies
  • Role-based access control (RBAC)
  • Kubernetes secrets for sensitive data

We will learn more about how to implement best security practices as it pertains to Kubernetes. 

What will you learn?

  • How to maintain security within Kubernetes containers

What you need before starting:

  • Nothing, use this as a resource

The pillars of Kubernetes security

Kubernetes has a number of security measures it easily supports and integrates.

Code security

Kubernetes supports declarative configuration with Git as the source of truth. This allows for the same code base being used for builds to be used for deployment across your organization. It also makes it easier to apply security best practices in one place and ensure it applies to whichever use the code is being applied to.

Image security

Images are scanned early and often throughout the development lifecycle, double checking for any errors before they become bigger issues down the line.

Identity and access management 

By default, Kubernetes comes with RBAC, which allows for users to be granted certain access privileges as needed with appropriate authentications. This bolsters overall security best practices and reduces any unnecessary exposure of your code.

Data security

Another feature that comes packaged with Kubernetes is etcd data storage, which can be encrypted to protect system data.

Configuration management

Kubernetes comes with tools such as KubeLinter, which can be used to analyze YAML and Helm charts. By checking these files, your organization can make sure the configuration being deployed is uniform and secure.

Secrets management and API security 

Using secrets management within Kubernetes provides a nice separation of sensitive data using secrets instead of hosting them in application manifests. Kubernetes also allows for DLS encryption to be applied to your relevant APIs.

Network security

Network policies also come with Kubernetes so that traffic between pods is efficiently controlled. There are also options for ingress and egress rules as needed.

Runtime observability, monitoring, and detection

Some of the many tools Kubernetes can integrate with include Grafana and Prometheus, which can provide security monitoring and runtime anomaly detection. 
 

K8s security in motion

With the many security capabilities of Kubernetes, how do they get applied throughout the container lifecycle?

From the earliest stage of the container lifecycle, the build stage, Kubernetes’s approach to security is a shared one. This includes measures such as automating container pipelines, using Kubernetes deployment analysis, private registries to manage images, and automating application deployment.

Once in the deploy stage, Kubernetes is safeguarded by reducing any potential attack surface. This can be accomplished by using an operating system optimized for containers, automating configuration management and policy enforcement across clusters, implementing least-privilege access with more refined role-based access controls, and running compliance checks against internet best practices.

Finally, in the run stage, users can further protect their containers using isolation and resource management. This is accomplished through application monitoring and logging with service mesh visualization, as well as threat detectors to kill pods quickly based on anomalous behavior.

These measures go well with Red Hat® OpenShift® clusters and Red Hat Advanced Cluster Security for Kubernetes, which can support these best practices. We can find out how in the next resource. 

Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2026 Red Hat
맨 위로 이동