Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10

Link
2026-03-30 ~1 min read www.redhat.com #openshift

⚡ TL;DR

Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10 New in Red Hat Advanced Cluster Security for Kubernetes Base images: Separation of duties OpenShift Console plug-in (Technology Preview) Vulnerability management for virtual machines (Technology Preview) StackRox MCP server (upstream) File activity monitoring (Technology Preview) Cluster registration secrets Policy criteria for CVE fix date Red Hat OpenShift Container Platform | Product Trial About the author Michael Foster More like this AI security: Identity and access control AI security: Defending against prompt injection and unsafe actions Collaboration In Product Security | Compiler Keeping Track Of Vulnerabilities With CVEs | Compiler Keep exploring Browse by channel Automation Artificial intelligence Open hybrid cloud Security Edge computing Infrastructure Applications Virtualization Share Security is an important aspect of any digital undertaking, and Kubernetes is no different. We’ve built Red Hat Advanced Cluster Security for Kubernetes to form a foundational layer of security across fleets, estates, and platforms, be it public, private, or hybrid clouds.

📝 Summary

Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10 New in Red Hat Advanced Cluster Security for Kubernetes Base images: Separation of duties OpenShift Console plug-in (Technology Preview) Vulnerability management for virtual machines (Technology Preview) StackRox MCP server (upstream) File activity monitoring (Technology Preview) Cluster registration secrets Policy criteria for CVE fix date Red Hat OpenShift Container Platform | Product Trial About the author Michael Foster More like this AI security: Identity and access control AI security: Defending against prompt injection and unsafe actions Collaboration In Product Security | Compiler Keeping Track Of Vulnerabilities With CVEs | Compiler Keep exploring Browse by channel Automation Artificial intelligence Open hybrid cloud Security Edge computing Infrastructure Applications Virtualization Share Security is an important aspect of any digital undertaking, and Kubernetes is no different. We’ve built Red Hat Advanced Cluster Security for Kubernetes to form a foundational layer of security across fleets, estates, and platforms, be it public, private, or hybrid clouds. Today we release Red Hat Advanced Cluster Security for Kubernetes version 4.10 as part of our ongoing effort to make life easier for Red Hat OpenShift users when it comes to building and enforcing security policies for their clusters. Chief among these updates is the new integration of vulnerability management into OpenShift Console, and the separation of duties between base images and layers. This makes it easier for administrators and operators to handle security-related information and remediation without having to switch between dashboards and contexts. And as always, we’re laying even more groundwork for future support with this release: We’re releasing a tech preview of vulnerability management for virtual machines (VMs) running on Red Hat OpenShift Virtualization, and we’ve changed the way base images are handled. More on that further down. If you're eager to just get started, sign up for a free trial of Red Hat Advanced Cluster Security for Kubernetes. If you want more detail, here are some of the new features in the latest release: Vulnerability Management innovations Base images: Separation of duties OpenShift Console plug-in (Technology Preview) Vulnerability management for virtual machines (Technology Preview) Base images: Separation of duties OpenShift Console plug-in (Technology Preview) Vulnerability management for virtual machines (Technology Preview) StackRox MCP server (upstream) File activity monitoring (Technology Preview) Cluster registration secrets Policy criteria for CVE fix date Organizations typically use a standardized base image (also known as a golden image ) to maintain a secure foundation. These often include third-party provider versions, such as Red Hat Enterprise Linux (RHEL), as well as custom images built by DevOps teams to meet specific security standards. With Red Hat Advanced Cluster Security for Kubernetes 4.10, users can designate these standardized images. Red Hat Advanced Cluster Security for Kubernetes identifies the base image within an application image and distinguishes its layers from those added by the application owner.