Through this activity, we will quickly see the main features of Red Hat Advanced Cluster Security
To access rhacs, click on the path menu at the top right and click on Red Hat Advanced Cluster Security.
Select atelier-opp as the authentication provider. Then click on login.
Authenticate with your username/password provided by the instructor.
Vulnerability management provides a dashboard containing important information on the applications deployed on the cluster. We mainly find the vulnerabilities (CVE included), which are the most widespread or the most recent, from which the Docker images used come. The dashboard also provides the vulnerabilities present within the cluster.
RHACS can scan deployed images and integrates with your registry. RHACS also provides extensive support for third-party scanners such as Anchore, Red Hat Quay, Clair, and Tenable to complement your existing image scanning tools.
Let’s take a look at the Risks view, where we go beyond the basics of vulnerabilities to understand how deployment configuration and execution activity affect the likelihood of an exploit occurring.
This list displays deployments, across all clusters and namespaces, ordered by risk priority. The risk is calculated according to the activity of the application, its exposure, the number of deployments and the CVEs present. The view is ranked in order of priority. Thus, this functionality will allow you to concentrate your efforts on the deployments that present the most risks.
The Network Graph is both a flow view and a NetworkPolicy generator.
Network Graph is a functionality for visualizing deployments present on your namespaces. Thus, this functionality presents you in the form of a flow diagram, the different connections existing on your different pods. Based on the diagram you can make decisions about adding or removing flows. The strong point of the Network Graph is that RHACS can generate network policies for you in order to better protect and partition your connection flows.
The Violations section is a feature in the form of a register that records all specific moments when a policy created by the security team was not respected in your cluster.
This register allows you, at a glance, to see the policy violations present on your cluster by filtering several pieces of information such as:
Click on any violation to see more details.
The Compliance Operator provides you with a dashboard that allows you to access defined metrics to see the state of compliance required in certain areas of activity such as banking and medicine. The Compliance Operator evaluates both Kubernetes API resources and Openshift resources, as well as the nodes running on the cluster. This feature uses OpenSCAP, a NIST-certified tool, to analyze and enforce security policies provided by content.
Configuration Management, provides efficient configuration management that combines all entities on a single page. It brings together information about all your clusters, namespaces, nodes, deployments, images, secrets, users, groups, service accounts and roles in a single view, helping you visualize different entities and the connections between them.
With policy management, RHACS allows you to use out-of-the-box security policies and define custom multi-factor policies for your container environment. Configuring these policies allows you to automatically prevent high-risk service deployments in your environment and respond to runtime security incidents.
All policies provided with the product are designed with the goal of providing targeted corrective actions that improve security hardening.
You will see that this list contains many policies on build and deployment to detect configuration errors (for example in a pipeline), but also execution policies which refer to specific hardening recommendations.