Using Red Hat Advanced Cluster Security for Kubernetes you can view policy violations, drill down to the actual cause of the violation, and take corrective actions.
Red Hat Advanced Cluster Security for Kubernetes built-in policies identify a variety of security findings, including vulnerabilities (CVEs), violations of DevOps best practices, high-risk build and deployment practices, and suspicious runtime behaviors. Whether you use the default out-of-box security policies or use your own custom policies, Red Hat Advanced Cluster Security for Kubernetes reports a violation when an enabled policy fails.
You can analyze all violations in the Violations view and take corrective action.
To see discovered violations, select Violations from the left-hand navigation menu on the RHACS portal.
The Violations view shows a list of violations with the following attributes for each row:
Deployment: The name of the deployment.
Cluster: The name of the cluster.
Namespace: The namespace for the deployment.
Policy: The name of the violated policy.
Enforced: Indicates if the policy was enforced when the violation occurred.
Severity: Indicates the severity as Low
, Medium
, High
, or Critical
.
Categories: The policy categories.
Lifecycle: The lifecycle stages to which the policy applies, Build
, Deploy
, or Runtime
.
Time - The date and time when the violation occurred.
Similar to other views:
You can select a column heading to sort the violations in ascending or descending order.
Use the filter bar to filter violations. See the Searching and filtering section for more information.
Select a violation in the Violations view to see more details about the violation.
When you select a violation in the Violations view, the Violation Details panel opens on the right.
The Violation Details panel shows detailed information grouped by multiple tabs.
The Violation tab of the Violation Details panel explains how the policy was violated. If the policy targets deploy-phase attributes, you can view the specific values that violated the policies, such as violation names. If the policy targets runtime activity, you can view detailed information about the process that violated the policy, including its arguments and the ancestor processes that created it.
The Enforcement tab of the Details panel displays an explanation of the type of enforcement action that was taken in response to the selected policy violation
The Deployment tab of the Details panel displays details of the deployment to which the violation applies.
The overview section lists the following information:
Deployment ID: The alphanumeric identifier for the deployment.
Updated: The time and date when the deployment was updated.
Cluster: The name of the cluster where the container is deployed.
Namespace: The unique identifier for the deployed cluster.
Deployment Type: The type of the deployment.
Replicas: The number of the replicated deployments.
Labels: The labels that apply to the selected deployment.
Annotations: The annotations that apply to the selected deployment.
Service Account: The name of the service account for the selected deployment.
The container configuration section lists the following information:
Image Name: The name of the image for the selected deployment.
Resources:
CPU Request (cores): The number of cores requested by the container.
Memory Request (MB): The memory size requested by the container.
Volumes:
Name: The name of the location where the service will be mounted.
Source: The data source path.
Destination: The path where the data is stored.
Type: The type of the volume.
secrets: secrets associated with the selected deployment.
Lists whether the container is running as a privileged container.
Privileged:
true
if it is privileged.
false
if it is not privileged.
The Policy tab of the Details panel displays details of the policy that caused the violation.
The policy details section lists the following information:
Id: The numerical identifier for the policy.
Name: The name of the policy.
Description: A detailed explanation of what the policy alert is about.
Rationale: Information about the reasoning behind the establishment of the policy and why it matters.
Remediation: Suggestions on how to fix the violation.
Enabled: Indicates if the policy is enabled.
Categories: The policy category of the policy.
Lifecycle Stage: Lifecycle stages that the policy belongs to, Build
, Deploy
, or Runtime
.
Severity - The risk level for the violation.
Lists the policy criteria for the policy.