DO430-Securing Kubernetes Clusters with Red Hat Advanced Cluster Security

Securing Kubernetes Clusters with
Red Hat Advanced Cluster Security

Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment.

Course Overview

Many security teams are still getting up to speed with Kubernetes and OpenShift, making RHACS rollout tricky. This course helps teams integrate RHACS seamlessly into their DevOps workflow to automate DevSecOps, secure workloads, and streamline compliance all without slowing down development.

What You’ll Learn:

  1. Set up RHACS architecture, follow installation best practices, and troubleshoot common issues

  2. Perform vulnerability scans, prioritize risks, and generate actionable reports

  3. Implement and enforce RHACS policies in your CI/CD pipeline to secure your software supply chain

  4. Identify and fix network policy gaps using Network Graph

  5. Run compliance scans, configure the compliance operator, and generate compliance reports

  6. Integrate RHACS with external tools like image registries and SIEMs for centralized alerts, backups, and role management

Who Should Attend:

  1. Security professionals protecting Kubernetes environments

  2. Infrastructure admins maintaining secure, compliant clusters

  3. Platform engineers embedding security in DevOps/DevSecOps pipelines

Course Outline
  1. Installing Red Hat Advanced Cluster Security for Kubernetes
    Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues.
  2. Vulnerability Management with Red Hat Advanced Cluster Security for Kubernetes
    Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions.
  3. Policy Management with Red Hat Advanced Cluster Security for Kubernetes
    Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain.
  4. Network Segmentation with Red Hat Advanced Cluster Security for Kubernetes
    Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline.
  5. Manage Compliance with Industry Standards with Red Hat Advanced Cluster Security for Kubernetes
    Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance.
  6. Integrate External Components with Red Hat Advanced Cluster Security for Kubernetes
    Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management.
Impact on the Organization

Securing Kubernetes Clusters with Red Hat Advanced Cluster Security supports customers who run containerized workloads on Kubernetes, and who often face several security-related challenges:

  • Delays in container deployments due to security issues
  • Revenue loss due to Kubernetes-related security incidents
  • Decreased developer productivity due to time that is spent to address security concerns

This course teaches how RHACS provides actionable solutions to address these challenges, to help teams secure their Kubernetes environments more effectively and to streamline development workflows to include security checks at an early stage.

Impact on the Individual

As a result of attending this course, students will be able to install and use RHACS. They will also secure their Kubernetes workloads and clusters according to the best industry practices.

In particular, students should be able to demonstrate the following skills:

  • Installing RHACS Central and importing secure clusters. Moreover, they will learn how to establish a secure foundation across multiple clusters.

  • Troubleshooting and fixing common installation issues. As a result, they will improve overall system reliability.

  • Interpreting vulnerability results and generating reports. In addition, they will understand how to use this data to guide remediation.

  • Identifying and mitigating risks in deployments. Furthermore, they will gain the ability to prioritize and address critical issues.

  • Creating and enforcing build, deployment, and runtime policies. Consequently, this will strengthen the security posture of applications.

  • Implementing policy checks in a CI/CD pipeline to secure the software supply chain. For example, policies will help prevent insecure builds from being deployed.

  • Applying network segmentation to reduce attacks. In other words, students will design safer communication paths within clusters.

  • Generating and applying network policies within a CI/CD pipeline by using roxctl commands. In this way, automation will ensure consistent enforcement.

  • Managing and retrieving compliance evidence. Additionally, they will be prepared to meet audit and regulatory requirements.

  • Applying third-party integrations for centralized alert notification, backup and restore, and identity and permission management. Finally, these integrations will extend functionality and improve operational efficiency.

Book For Free Demo Session

Get a free demo session and explore how our solutions can help you! Experience our expertise firsthand and see how we can add value to your business.

Red Hat Learning Subscription

Comprehensive training and learning pathways on Red Hat products, industry-recognized certifications, and a flexible and dynamic IT learning experience.

Request More Information

Blank Form (#3)