Navigating RHACS

Module goals

  • Understand the various modules in RHACS.

  • Comfortably navigate the UI.

  • Set the foundation for exploring the rest of the modules in the roadshow.

  • Help you come up with questions for the RHACS team.

RHACS basics

RHACS provides the tools and capabilities to address the security needs of a cloud-native development approach on Kubernetes. These security features represent any developer or administrator’s primary work across various environments, including multiple datacenters, private clouds, or public clouds that run Kubernetes clusters.

RHACS features

Using Red Hat Advanced Cluster Security for Kubernetes, you can gain comprehensive Kubernetes security that includes the following use cases:

  • Visibility: See your entire landscape of images, registries, containers, deployments, and runtime behavior.

  • Vulnerability Management: Identify and remediate vulnerabilities in container images and Kubernetes across the entire software development life cycle.

  • Compliance: Audit your systems against CIS Benchmarks, NIST, PCI, and HIPAA, with interactive dashboards and one-click audit reports.

  • Network Security: Visualize existing connections and enforce tighter segmentation using Kubernetes-native controls to reduce your blast radius.

  • Security Policy Guardrails: See all your deployments ranked by risk level, using context from Kubernetes' declarative data, to prioritize remediation.

  • Configuration Management: Apply best practices for Docker and Kubernetes to harden your environment for a more secure and stable application.

  • Threat Detection: Use rules, automated allow lists, and baselining to identify suspicious activity in your running applications accurately.

  • Incident Response: Take action, from failing builds and blocking deployments to killing pods and thwarting attacks, using Kubernetes for enforcement.

Accessing the RHACS console

Your RHACS Console is available at: {acs_route}[window=blank]

Administrator login is available with:

RHACS Console Username:

{acs_portal_username}

RHACS Console Password:

{acs_portal_password}

Please ensure that you have access before proceeding.

Introduction to the RHACS console

The first section of this lab will focus on navigation and vulnerability management. This work will take place in the UI and require you to use both the dashboard and the lab environment.

Navigating the RHACS console

In this section, you familiarize yourself with the RHACS console, including its tabs, search capabilities and dashboard functionality.

The "Dashboard" or RHACS home page has 3 sections:

  1. Navigation bar

  2. Navigation drawer

  3. Dashboard

acs numbered dashboard

1. Navigation bar

The top bar contains the following functionality:

  • Global search

  • Command-line tools

  • Cluster health

  • Documentation

  • API reference

  • Enable dark/light Mode

  • Logged-in user account

acs top bar

The ability to instantly find resources is essential to safeguard your cluster. Utilize the RHACS search feature to find relevant resources faster. For example, you can use it to find deployments exposed to a newly published CVE or all deployments with external network exposure.

A search query

A search query consists of two parts:

  • An attribute that identifies the resource type you want to search for.

  • A search term that finds the matching resource.

For example, to find all violations in the ctf-web-to-system deployment, the search query is Deployment THEN ctf-web-to-system.

In this search query, Deployment is the attribute, and ctf-web-to-system is the search term.

The search field in RHACS requires each attribute to be entered fully as a search term. Enter your first attribute, and hit the <tab> key to move along to the following attribute you would like to enter. Watch the video below for a demonstration.


RHACS maintains a library of searchable assets to help you search faster. They will appear in a drop-down list, and you can click on them to enter them as well. If a specific CVE or deployment cannot be found, please confirm the spelling of the asset name or that it is correctly deployed in the cluster.

You can also search using REGEX like capabilities. Add an r/ before the search term to find all possibilities. For example if you search for Namespace:r/st.*x, the results include matches from namespace stackrox and stix.



Common search queries

Here are some common search queries you can try in the RHACS search bar if you’d like to test its functionality.

Query

Example

Purpose

CVE:<CVE_number>

CVE:CVE-2018-11776

Finding deployments that are affected by a specific CVE

Privileged:<true_or_false>

Privileged:true

Finding privileged running deployments

Exposure Level:<level>

Exposure Level:External

Finding deployments that have external network exposure

RHACS, like Kubernetes, works on a key:value system primarily due to its flexibility and power in organizing, selecting, and managing resources, but also because of the ability to set selectors and match objects based on a set of values (e.g., 'in', 'not in', 'exists', 'does not exist')."
acs search cve
This is just a sample of the types of queries you can use to analyze your environment in RHACS. For additional examples of search queries, please see the RHACS documentation.

Local page filtering

You can use local page filtering from within all views in the RHACS portal. Local page filtering works similarly to the global search, but only relevant attributes are available. You can select the search bar to show all available attributes for a specific view.

For example, filtering in the violations window by the default namespace.



As you can see, the content is only relevant to the violations tab, but the search capabilities, including the use of r/, remain the same.

2. Navigation menu

acs nav 01

The left-hand navigation menu provides access to each of the security use cases, as well as product configuration to integrate RHACS with your existing tooling. The navigation menu has the following items:

  • Dashboard: Summary view of your environment

  • Network Graph: Real time network flows and public ports that are available. Enables to automated creation of Network Policies to implement network segmentation

  • Violations: Events that are in violation of the default and your defined security policies

  • Compliance: Our new compliance dashboard (Self titled NextGen Compliance) update is in progress. With plans to make compliance reporting even easier with tailored compliance profiles and reporting by application, namespace and cluster.

  • Vulnerability Management: Over the past year, we’ve revamped our Vulnerability Management workflows, focusing on filtering important and critical issues. We’ve also introduced node, platform, and workload-specific vulnerability dashboards. This segmentation helps the operations team quickly identify where a vulnerability exists and determine which team to contact, making the process much more efficient.

  • Configuration Management: The configuration management tab enables you to identify potential misconfigurations that can lead to security issues

  • Risk: The Risk tab points out major risky applications by using configuration, runtime, and vulnerability data, helping you focus on the "high-risk" workloads.

  • Platform Configuration: RHACS configuration, policy management and integration details, including;

    • Clusters

    • Policy Management

    • Collections

    • Integrations

    • Exception Configuration

    • Access Control

    • System Configuration

    • Administration Events

    • System Health

3. Dashboard

The Red Hat Advanced Cluster Security for Kubernetes (RHACS) Dashboard provides quick access to the data you need. It contains additional navigation shortcuts and actionable widgets that are easy to filter and customize so that you can focus on the data that matters most to you. You can view information about levels of risk in your environment, compliance status, policy violations, and common vulnerabilities and exposures (CVEs) in images.

acs dashboard 01

The main dashboard is your place to look at the vulnerabilities, risk, compliance, and policy violations across your clusters and namespaces. This section addresses all of the functionality in the main dashboard to help you navigate it more effectively in the future. The dashboard can be broken down into three main sections:

  1. The status bar

  2. The dashboard filter

  3. The actionable widgets

acs dashboard 02

1. The status bar

The status bar provides at-a-glance numerical counters for critical resources. The counters reflect what is visible with your current access scope, defined by the roles associated with your user profile.

These counters are clickable, providing fast access to the desired list view pages as follows:

Counter

Destination

Clusters

Platform Configuration → Clusters

Nodes

Configuration Management → Applications & Infrastructure → Nodes

Violations

Violations Main Menu

Deployments

Configuration Management → Applications & Infrastructure → Deployments

Images

Vulnerability Management → Dashboard → Images

Secrets

Configuration Management → Applications & Infrastructure → Secrets

2. The dashboard filter

The dashboard includes a top-level filter that applies simultaneously to all widgets. You can select clusters and one or more namespaces within selected clusters. Any change to the filter is immediately reflected by all widgets, limiting the data they present to the selected scope.

The dashboard filter does not affect the status bar, and when no clusters or namespaces are selected, the view automatically switches to All.
acs dashboard 03
acs dashboard 04

3. Actionable widgets

If you have time, adjust the dashboard filtering options and widgets to hone the filtering capabilities.

With these widgets, you can customize the information displayed on the dashboard by default in order to find the items that you consider most important to your deployments and your business' security.

Navigating the main use cases

Network

We are going to work from the top down throughout the ACS dashboard to give you an overview of all of the use cases that ACS will cover, starting with the network UI.

00 network 1

The network user interface contains two drop-downs: the network graph tab and the listening endpoints tab.

The network graph tab allows you to visualize all the network connections in your cluster look at Baseline flows simulate Network policies manage CIDR blocks and more

00 network 2

With the Listening Endpoints tab, you can see all of the deployments across your clusters and audit for any reported listening endpoints. As you drill down through cluster namespace and into deployments, you will see the exact process ID, Port protocol pod ID, container name and whether they are exposed.

00 network 3

Violations

On to the violations tab.

The violations tab is where you will manage all of your policy violations. The violations tab is excellent for managing policy violations in the workflow.

It contains:

  • The exact policy that was violated

  • The entity that violated the policy

  • The type

  • If it is enforced

  • The severity of that policy

  • The category

  • The life cycle

  • And the time of the violation

01 violations 1

Don’t worry, you’ll go through this policy violation workflow in later modules.

Compliance

Red Hat Advanced Cluster Security for Kubernetes supports OpenShift Container Platform configuration compliance standards through an integration with the OpenShift Container Platform Compliance Operator. In addition, it allows you to measure and report on configuration security best practices for OpenShift and supported Kubernetes platforms.

The OpenShift Compliance Operator allows OpenShift Container Platform administrators to define the desired compliance state of a cluster and provides an overview of gaps and ways to remediate any non-compliant policy. We will be installing and managing the compliance operator in later modules

The Compliance dropdown has three tabs to choose from.

  • Coverage

  • Schedules

  • Dashboard

Coverage

The Coverage tab will contain all of your scanned clusters and workloads after the Compliance Operator is setup. You will go through this in the Compliance section later in the roadshow.

00 compliance 1

Schedules

As you can see, the content is only relevant to the violations tab, but the search capabilities, including the use of r/, remain the same.reated scan schedules that report on the various CIS, PCI-DSS and DISA-STIG compliance standards you wish to evaluate.

00 compliance 2

Compliance Dashboard (Previously Compliance 1.0)

The Compliance dashboard will be empty when you’re here for the first time. This is because you have not completed a scan yet. Let’s go ahead and schedule our first scan.

00 compliance 3
Procedure
  1. Hit the Scan environment button in the top right of the page to kick off your first scan.

  2. Ensure you see the bar graphs fill up with data before moving. We we will review these compliance results in a later module.

01 compliance 4

We will dive deeper into this tab in later sections but feel free to explore and

Vulnerability Management

Next, we have the Vulnerability Management tab, which has been overhauled for greater visibility and efficient filtering.

00 vuln 1

The Vulnerability Management tab contains a lot of information including

  • Workload CVEs

  • Exception Management

  • Vulnerability Reporting

  • Platform CVEs

  • Node CVEs

  • Dashboard (Deprecated)

Feel free to click around, and get your questions ready as the upcoming module will be exploring the Vulnerability Management tab in detail.

Configuration Management

The Configuration Management tab contains a bunch of information about the security configuration across your OpenShift and Kubernetes clusters

00 config 1

This information includes:

  • Policy violations by severity

  • Specific standards like the CIS Kubernetes 1.5 standard

  • Users with the most cluster admin roles

  • Secrets used across deployments

Risk

The Risk tab is a combination of security configuration management, Network detection, runtime information, incident response, and vulnerability management all coming together so that users can gain a greater context and prioritize security issues throughout OpenShift and Kubernetes clusters.

00 risk 1

In this tab you can review risk indicators deployment details and look at process discoveries such as runtime processes in a container all of this information is designed to help you gain a greater understanding of the priority of specific workloads in your cluster as security is not only vulnerability management

00 risk 2

Platform Configuration

RHACS configuration, policy management and integration details, including; * Clusters:

00 pc 1

Where you can manage your clusters, check out cluster status, watch your credential expiration manager delegated scanning, and onboard your clusters via init bundles

Policy Management

00 pc 2

The policy management tab is where you manage well … all of your policies. many of default policies are built into ACS, but this is where you will clone, edit, and create all of your policies via the UI

Collections

00 pc 3

In the collections tab, you can configure deployment collections to associate with other workflows to create a collection and then apply a policy directly to that collection of containers/deployments/clusters. This workflow and this tab will help you scale and manage your policies across clusters, groups, regions, or whatever it is you’re seeking to apply specific policy, reporting, and compliance standards to

Integrations

00 pc 4

The integration tab holds all of your options for: - Image integration - Signature Integrations - Notifier Integrations - Backup Integrations - Cloud Source Integrations - and authentication tokens

Exception Configuration

Configure exception behavior for vulnerabilities

00 pc 5

Access Control

00 pc 6

The access control tab is where you set up your authentication providers and the roles that you would like to have an ACS, along with permission sets and access scopes.

System Configuration

00 pc 7

The system configuration tab manages things like private data retention configuration cluster deletion public configuration and all of these are settings are editable

Administration Events

00 pc 8

The administration events tab is handy for troubleshooting platform issues by reviewing event logs now, these logs are approached after four days by default, but you can change that in the system configuration tab. We will have a whole section on the administration events later, but it is beneficial for diagnosing issues and looking into domains such as authentication image scanning Integrations and more

System Health

00 pc 9

And lastly, the system Health Tap will help you handle things like Administration usage, generate diagnostic bundles that you monitor cluster status sensor upgrades, credential expiration, and more.

Summary

giphy

Nice job!

In this module, you learned how to navigate the ACS dashboard and perform basic search queries. You have the navigational basics to move through the ACS UI proficiently. On to Vulnerability Management!!