Securing Kubernetes Clusters with Red Hat Advanced Cluster Security with Exam (DO431) – Contenuti

Contenuti dettagliati del Corso

Installing Red Hat Advanced Cluster Security for Kubernetes
Describe and implement the RHACS architecture and its components, follow recommended practices for its installation, and troubleshoot common installation issues.

Vulnerability Management with Red Hat Advanced Cluster Security for Kubernetes
Interpret vulnerability scanning results, generate vulnerability reports, and evaluate risks to prioritize your security actions.

Policy Management with Red Hat Advanced Cluster Security for Kubernetes
Implement and enforce RHACS policies across all stages of policy enforcement to secure the CI/CD pipeline and to protect the software supply chain.

Network Segmentation with Red Hat Advanced Cluster Security for Kubernetes
Identify and close security gaps in network policies by using Network Graph and apply the generated network policies in a CI/CD pipeline.

Manage Compliance with Industry Standards with Red Hat Advanced Cluster Security for Kubernetes
Run in-built compliance scans, and install and run the compliance operator to determine cluster compliance with security policies and standards and to produce reports and evidence of compliance.

Integrate External Components with Red Hat Advanced Cluster Security for Kubernetes
Integrate RHACS with external components to provide additional functions, which include centralized alert notification, backup and restore, and identity and permission management.