Skip to main content
availability

Package: Invicti AppSec Enterprise (on-premise, on-demand)

Red Hat Advanced Cluster Security

Red Hat Advanced Cluster Security (RHACS) for Kubernetes provides container image vulnerability scanning and Kubernetes security posture management. In Invicti AppSec, the integration connects to your RHACS instance to import container image vulnerability findings.

Prerequisites

FieldDescription
Authentication TypeChoose between Basic (Username + Password) or Token authentication
UsernameRHACS username (Basic auth only)
PasswordRHACS password (Basic auth only)
TokenAPI token for RHACS (Token auth only)
URLThe base URL of your RHACS instance (e.g., https://central.rhacs.example.com)

Get Credentials (on RHACS Side)

For Basic Authentication:

  1. Use your existing RHACS username and password.

For Token Authentication:

  1. Log in to the RHACS Central UI.
  2. Navigate to Platform Configuration > Integrations > Authentication Tokens.
  3. Click Generate Token.
  4. Select the appropriate role (e.g., Analyst for read-only access).
  5. Copy the generated token immediately — it is shown only once.

Step 1: Navigate to Integrations

From the left sidebar menu, click on Integrations.

Integrations sidebar

Step 2: Select the CS Tab

On the Integrations > Scanners page, click on the CS tab.

CS tab

Step 3: Find and Activate Red Hat Advanced Cluster Security

Scroll through the list of CS scanners to find Red Hat Advanced Cluster Security.

  • If RHACS is not activated, click the Activate button to enable the integration.

Step 4: Configure Connection Settings

Click the gear icon on the RHACS card to open the settings panel. Fill in the required fields:

FieldDescriptionRequired
Authentication TypeSelect Basic (Username + Password) or TokenYes
UsernameRHACS username (shown when Basic is selected)Yes (Basic only)
PasswordRHACS password (shown when Basic is selected)Yes (Basic only)
TokenRHACS API token (shown when Token is selected)Yes (Token only)
URLBase URL of your RHACS Central instanceYes
InsecureSkip TLS certificate verification (use only for self-signed certificates)No
Red Hat Advanced Cluster Security settings

Step 5: Test the Connection

Click Test Connection. A green Connection successful message confirms that Invicti AppSec can authenticate with the RHACS API.

Summary

StepAction
1Navigate to Integrations from the sidebar
2Select the CS tab
3Activate Red Hat Advanced Cluster Security
4Select authentication type and enter credentials and URL
5Test the connection

Create a Scan

  1. Open a project in Invicti AppSec.
  2. Go to Settings > Scanners.
  3. Click Add Scanner.

Add Red Hat Advanced Cluster Security Scanner

  1. Select CS as the scanner type.
  2. Choose Red Hat Advanced Cluster Security from the scanner list.
  3. Click Add to open the scan configuration drawer.

Scan Configuration Fields

FieldDescriptionRequired
EnvironmentThe deployment environment (e.g., feature, production)No
Bind toSelect the container image from RHACS to associate with this scanYes
BranchSource code branch for this scanYes
Meta DataAdditional metadata to tag the scanNo
Scan TagFree-text tag to identify or group scansNo
Fork Default Branch / Fork Source BranchEnable to fork scan results from the default or source branchNo
note

Bind to links the Invicti AppSec project to a specific container image tracked in RHACS. Vulnerability findings from that image will be imported into the project.

Red Hat Advanced Cluster Security scan creation

Scheduler

Enable the Scheduler toggle to automatically run RHACS scans on a recurring schedule.

Webhook (Optional)

Add a webhook URL to receive scan completion notifications.

KDT Command

kdt scan -p <project_name> -t redhatcs -b <branch_name>

Troubleshooting

Connection Fails

IssueResolution
Invalid username or passwordVerify the credentials against your RHACS Central instance.
Invalid API tokenThe token may have expired or been revoked. Generate a new token in RHACS under Authentication Tokens.
URL unreachableConfirm the RHACS Central URL is reachable from the Invicti AppSec server. Check firewall and network rules.
TLS certificate errorIf using a self-signed certificate, enable the Insecure option in the connection settings.
Insufficient permissionsEnsure the user or token has at least read access to image vulnerability data in RHACS.

Scan Issues

IssueResolution
No images available in Bind to dropdownEnsure at least one container image has been scanned in RHACS and is accessible via the credentials provided.
Scan shows no findingsThe image may have no known vulnerabilities, or the RHACS scan may not have completed yet. Check the RHACS console.
Scan not startingVerify the scanner is activated and the connection test passes in the integration settings.

Best Practices

  • Prefer Token authentication over Basic authentication to avoid exposing user credentials.
  • Use a dedicated RHACS service account or token with the minimum required permissions (read-only) for Invicti AppSec.
  • Rotate API tokens periodically and update the integration settings in Invicti AppSec accordingly.
  • Associate each Invicti AppSec project with the specific container image that represents its production artifact for accurate vulnerability tracking.
  • Use the Scheduler to align scans with your container image rebuild cadence so findings always reflect the latest image state.

Limitations

  • RHACS CS in Invicti AppSec imports vulnerability data from existing RHACS image scans — it does not trigger new RHACS scans.
  • Only images already tracked within RHACS are available for binding; images not yet scanned by RHACS will not appear.
  • Runtime threat detection signals from RHACS are not surfaced in Invicti AppSec findings; only vulnerability data is imported.

Need help?

Invicti Support team is ready to provide you with technical help. Go to Help Center

Was this page useful?