Foundations of container-level security with Red Hat Advanced Cluster Security for Kubernetes

Red Hat® Advanced Cluster Security for Kubernetes is a Kubernetes-native security platform that enables you to build, deploy, and run cloud-native applications with more security. This learning path guides you through the reasons, methods, and tools used to protect workloads on Kubernetes. It includes reading materials, videos, and a live hands-on demo. 

This learning path is for system administrators, security practitioners, or DevSecOps teams
Developers may want to check out “Develop containers using Kubernetes” on developers.redhat.com. 

Get started on developers.redhat.com

What is security for containers?

10 mins

Container security involves defining build, deployment, and runtime practices to protect a Linux® container. Given that so much happens within and outside of the containers, security measures must be continuous and support your organization’s overall security strategies.

Applying security to Kubernetes containers will build on various outputs including deployments, pods, policies, etc. 

What will you learn?

  • Security concepts for containers and Kubernetes

What you need before starting:

  • Nothing, use this as a resource

Container security

Container security is not just one thing to be implemented, but rather it spans across multiple points in the development cycle. Think of applying security measures to ensure your supply chain, where the supply chain is your content and code traveling through your containers. With this in mind, there are several key areas to consider for security needs:

Container images

The first and most basic component of containers is the layers of files they are created out of, called container images. The base images that are used as a starting point for creating other images must be secured as a trusted resource first and foremost. A good security measure is to ensure that this image comes from a known open source group, hosted on a reputable registry, and has all source code available. On top of these precautions, container images should be scanned on a regular cadence to look out for any modifications that could compromise your overall workflows.

Access management

Another important security rule is checking that your team has the permissions they need to access the container images, as well as preventing anyone who shouldn’t. Role-based assignments in particular can be effective in mitigating any potential human errors that may result in vulnerabilities to your images.

Automated testing and deployment

After a build is completed, they should be managed according to Center for Internet Security (CIS) standards. This can be pursued through automated policies designed to raise flags with any security issues or vulnerabilities found in the build.

These options can enable your organization to secure your containers and workloads more easily. Now that you have a grasp as to what security measures can be applied to your containers, next we’ll learn the specifics of each as it applies to Kubernetes. 

Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2026 Red Hat
맨 위로 이동