Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Advanced Cluster Security Cloud Service is now Generally Available

Red Hat Advanced Cluster Security Cloud Service graduates from limited availability to general availability! This release allows customers to access a fully managed software-as-a-service to help protect their containerized applications across the full application lifecycle in any major cloud environment. With this announcement, Red Hat Advanced Cluster Security Cloud Service is now feature-complete and fully tested by Red Hat.We understand the need to move quickly and at scale in the application development lifecycle. With Advanced Cluster Security Cloud Service, the Red Hat team takes on the

Red Hat Blog
#vulnerability#google#microsoft#amazon#linux#red_hat#kubernetes#aws

Red Hat Advanced Cluster Security Cloud Service graduates from limited availability to general availability! This release allows customers to access a fully managed software-as-a-service to help protect their containerized applications across the full application lifecycle in any major cloud environment. With this announcement, Red Hat Advanced Cluster Security Cloud Service is now feature-complete and fully tested by Red Hat.

We understand the need to move quickly and at scale in the application development lifecycle. With Advanced Cluster Security Cloud Service, the Red Hat team takes on the responsibility of operational complexities to expedite that journey. As a fully hosted and managed cloud service platform, Advanced Cluster Security Cloud Service enables customers and partners to focus on developing innovative applications that contribute business value by reducing the security operational management burden.

Available where you are

Red Hat Advanced Cluster Security Cloud Service extends beyond Red Hat OpenShift to support Kubernetes services from major cloud providers such as Amazon Elastic Kubernetes Service (EKS), Microsoft Azure Kubernetes Service (AKS), and Google Kubernetes Engine (GKE). Users can protect applications in Red Hat OpenShift environments as well as other major Kubernetes environments. Users have the option to purchase Red Hat Advanced Cluster Security Cloud Service on the AWS Marketplace and take advantage of flexible features to alleviate budgetary constraints like consumption-based pricing and to leverage committed cloud spend. Once purchased, users can use Red Hat Advanced Cluster Security Cloud Service to help protect their applications in public cloud provider Kubernetes, as well as private cloud and on-premises environments, with 24/7 Red Hat support across the application development lifecycle.

Key features

Some key features of Red Hat Advanced Cluster Security Cloud Service include:

  • Visibility - see your entire Kubernetes environment and its security posture, including images, deployments and runtime behavior
  • Vulnerability management - go beyond vulnerability scoring and implement full lifecycle vulnerability management that’s risk-based and includes mitigating vulnerabilities at runtime
  • Compliance — ensure your Kubernetes environment is compliant with industry standards and best practices, such as CIS Benchmarks, NIST and PCI
  • Network security - visualize actual and allowed network communications and improve Kubernetes-native network security controls to isolate and segment deployments to minimize the attack surface
  • Risk profiling - see a stack-ranked list of all of your deployments with risk factors to identify the highest priority security issues
  • Security policy guardrails - enforce security configuration best practices by scanning deployments for common security issues such as excess privileges or insecure RBAC settings.
  • Threat detection & response - use behavioral analysis, rules, and AllowList and blocklist to assess runtime behavior and detect and respond to abnormal activity indicative of an attack

Red Hat is committed to accelerating developer productivity with solutions that make it easy to include security guardrails in the developer workflow and software supply chain. By shifting security and compliance checks left towards the beginning of the application development lifecycle, where developers are building their applications, Red Hat Advanced Cluster Security Cloud Service can help reduce likely security vulnerabilities and help accelerate overall deployment.

Want to learn more? Check out our FAQ for commonly asked questions or try it yourself with a no-cost trial today!

Enter keywords here to search blogs

UI_Icon-Red_Hat-Close-A-Black-RGB

Browse by channel

Automation

The latest on IT automation for tech, teams, and environments

Security

The latest on how we reduce risks across environments and technologies

Edge computing

Updates on the platforms that simplify operations at the edge

Infrastructure

The latest on the world’s leading enterprise Linux platform

Applications

Inside our solutions to the toughest application challenges

Original shows

Entertaining stories from the makers and leaders in enterprise tech

Red Hat Blog: Latest News

Managed Identity and Workload Identity support in Azure Red Hat OpenShift