kubescape
kube-bench
Our great sponsors
kubescape | kube-bench | |
---|---|---|
76 | 23 | |
9,686 | 6,649 | |
1.4% | 1.8% | |
9.5 | 8.4 | |
13 days ago | 4 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kubescape
-
CodiumAI PR-Agent Dominates the Dev World with Versatility and Open-Source Power
CodiumAI PR-Agent’s influence extends deeply within open-source projects. An exemplary illustration is Kubespace, a Cloud Native Computing Foundation (CNCF) sandbox project. Since its adoption in August, Kubespace has been utilizing the PR-Agent service. They also recently had a public bug bounty collaboration with CodiumAI. This program added an extra layer of community-driven scrutiny, encouraging contributors to utilize simple commands like /describe for effective pull request messages. Here the contributor wanted to better describe the PR, so he used the /describe prompt.
-
Kubescape 3.0 is available to enhance your K8s security experience
Kubescape is the first Kubernetes security scanner that was accepted to the cloud native computing foundation. Kubescape 3.0 is a major release that extended the functionality of the original misconfiguration scanner to include vulnerabilities and usabillty improvements. If you are interested in an overview, feel free to check out the blog post. To dive straight into the code check out the repo. I'd love it hear what you think. What you like, what can be improved and of course, if you have any questions, hit me up.
- Shrink to Secure: Kubernetes and Secure Compact Containers
-
An Overview of Kubernetes Security Projects at KubeCon Europe 2023
Kubescape is a comprehensive Kubernetes security platform and CNCF sandbox project. It can scan clusters, Helm charts, and YAML manifests to detect misconfigurations. It supports various frameworks, including NSA-CISA, MITRE ATT&CK®, and the CIS Benchmark.
-
My CNCF LFX Mentorship Spring 2023 Project at Kubescape
Publishing
- K8s security just got easier. A single Open-Source security tool that seamlessly integrates into your entire stack.
- Scan manifest files (YAML and helm charts) directly from GitHub even with no clusters in place + assisted remediation for FREE.
- Don't let Kubernetes misconfigurations delay your deployment. Auto-scan manifest files directly from GitHub + assisted remediation.
- Detect critical vulnerabilities earlier in the development process and prevent CVEs from reaching production environments.
- Kubescape makes RBAC easy. Instantly reveal all the roles, resources, and relevant relationships to manage secure clusters.
kube-bench
-
Evaluating and securing your Kubernetes infrastructure with kube-bench
However, no matter how well our applications are secured, the security of our entire IT environment ultimately depends on the security of our infrastructure. Therefore, in the lab to follow, we will shift our focus away from Kubernetes workloads and instead explore how we can evaluate and improve upon the security of our Kubernetes clusters with kube-bench, the industry-leading Kubernetes benchmarking solution developed by Aqua.
-
Kube-bench and Popeye: A Power Duo for AKS Security Compliance
The official repository can be found here with detailed installation instructions.
-
Quickstart - Aqua Security Kube-Bench
curl -L [https://github.com/aquasecurity/kube-bench/releases/download/v0.6.10/kube-bench_0.6.10_linux_amd64.deb](https://github.com/aquasecurity/kube-bench/releases/download/v0.6.2/kube-bench_0.6.2_linux_amd64.deb) -o kube-bench_0.6.10_linux_amd64.deb
- Looking for Tips on Open Sourcing a kubernetes security tool
-
Kubernetes Security: 10 Best Practices from the Industry and Community
I haven't used Kubernetes for a while, but shouldn't kube-bench (1) be enough? Do you have to check anything manually?
(1) https://github.com/aquasecurity/kube-bench
-
Implement DevSecOps to Secure your CI/CD pipeline
kube-bench checks whether Kubernetes is deployed securely by running the checks documented in the CIS Kubernetes Benchmark. We can deploy kube-bench as a Job that runs daily and consume its report in CI/CD to pass or fail the pipeline based on the level of severity.
-
Securing Kubernetes Cluster using Kubescape and kube-bench
kube-bench can be executed as a simple command on the host, as a container on the host using Docker command, or as a job inside Kubernetes Cluster. In case it is run inside a container/pod, it will need access to the PID namespace of the host system. The methods to run kube-bench in AKS, EKS, GKE, On-prem cluster, Openshift and ACK (Alibaba Cloud Container Service For Kubernetes) are different but well documented.
-
What are some fundamental security practices for the self hosted k8s cluster?
Check this out: kube-bench - CIS Benchmark
-
Top 6 Kubernetes Security Tools
Kube-bench, written as a Go application, is deployable as a container. Ready-made job.yaml files make it easy to run Kube-bench inside a Kubernetes cluster or on a managed Kubernetes service, such as Azure Kubernetes Service (AKS), Amazon Elastic Kubernetes Service (EKS), Google Kubernetes Engine (GKE), or OpenShift. Here's a link to Kube-Bench on Github
-
Introduction to Kubernetes Pentesting
kube-bench - Checks whether Kubernetes is deployed securely by running CIS Kubernetes Benchmark
What are some alternatives?
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
falco - Cloud Native Runtime Security
kubesec - Security risk analysis for Kubernetes resources
kubeaudit - kubeaudit helps you audit your Kubernetes clusters against common security controls
checkov - Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
kube-hunter - Hunt for security weaknesses in Kubernetes clusters
grype - A vulnerability scanner for container images and filesystems
docker-bench-security - The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.