April 6, 2021 By Lucas Palm 2 min read

Cluster image security enforcement is a new feature available today in our IBM Cloud Kubernetes Service and Red Hat OpenShift on IBM Cloud offerings. 

Enabling image security enforcement in your cluster will provide you an easy way to ensure that the images running in your cluster meet specific security requirements set and controlled by you.

With image security enabled in your cluster, you can control where images are deployed from, enforce Vulnerability Advisor policies, ensure that content trust is properly applied to an image and more.

If an image does not meet your policy requirements, the pod is not deployed to your cluster or updated.

When you enable the image security feature in your cluster, you are getting a fully managed version of the open source Portieris project dedicated solely to your cluster.  This means that Portieris will receive the same high-availability benefits as your cluster masters do today. So, once enabled and configured to your liking, you can sit back and relax, knowing your cluster is protected at all times from undesirable images.


This feature is generally available today for the following cluster versions:

  • Kubernetes 1.18+
  • OpenShift 4.5+

Clusters at older versions will first need to upgrade to a supported version before you can enable image security.

Ready to get started?

Assuming your cluster is at a supported version level, enabling image security enforcement can be done in one easy step from the CLI or console. The installation documentation will walk you through this simple process.  

Once enabled, the next step would be to start creating image policies to control what images are allowed to run in your cluster. Image security policies define Portieris’ behavior in your cluster. You must configure your own policies in order for Portieris to enforce your required security posture.  

As an “out-of-the-box” bonus, the IBM-owned images we deploy into your cluster will already have the proper security enforcement applied to them, so all that is left for you to do is configure how you want your own images to behave.

Learn more about the IBM Cloud Kubernetes Service and Red Hat OpenShift on IBM Cloud offerings.

More from Announcements

IBM and SAP unlock business and industry value with new generative AI solutions 

3 min read - IBM Consulting is delivering on our commitment to co-innovate with SAP and collaborate with our clients. As part of our Value Generation Partnership initiative announced earlier this month with SAP, we are releasing the first 10 of 100 planned AI solutions to help clients transform their industries, optimize their business processes and successfully deliver their SAP programs.  Delivering AI business and industry innovation at scale  With the recently announced Value Generation Partnership initiative, IBM and SAP are co-innovating intelligent industry…

IBM SevOne 7.0: Reaching application-centric multicloud network observability  

2 min read - As enterprises increasingly rely on network connectivity to support cloud-based applications and remote workers, network managers require new methods to monitor and safeguard connectivity across diverse environments, including corporate networks, software-defined WANs and multiple public cloud providers.   According to the recent EMA Network Megatrends Report, responding network professionals believe that 53% of network outages and performance issues could be prevented with improved network management tools, yet only 9% find it very easy to hire skilled networking personnel. This is why…

IBM Hybrid Cloud Mesh and Red Hat Service Interconnect: A new era of app-centric connectivity 

2 min read - To meet customer demands, applications are expected to be performing at their best at all times. Simultaneously, applications need to be flexible and cost effective, and therefore supported by an underlying infrastructure that is equally reliant, performant and secure as the applications themselves.   Easier said than done. According to EMA's 2024 Network Management Megatrends report only 42% of responding IT professionals would rate their network operations as successful.   In this era of hyper-distributed infrastructure where our users, apps, and data…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters