KubeArmor
Last updated
Last updated
KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level.
KubeArmor leverages Linux security modules (LSMs) such as AppArmor, SELinux, or BPF-LSM to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF.
π Getting Started
π― Use Cases
βοΈ KubeArmor Support Matrix
βοΈ How is KubeArmor different?
π Security Policy for Hosts/Nodes [Spec] [Examples] ... detailed documentation
π Contribution Guide
π§βπ» Development Guide, Testing Guide
β FAQs
π£οΈ Zoom Link
π Minutes: Document
π Calendar invite: Google Calendar, ICS file
KubeArmor uses Tracee's system call utility functions.
KubeArmor roadmap is tracked via KubeArmor Projects
Protect critical paths such as cert bundles MITRE, STIGs, CIS based rules Restrict access to raw DB table
Process Whitelisting Network Whitelisting Control access to sensitive assets
Process execs, File System accesses Service binds, Ingress, Egress connections Sensitive system call profiling
Kubernetes Deployment Containerized Deployment VM/Bare-Metal Deployment
KubeArmor is Sandbox Project of the Cloud Native Computing Foundation.