KubeArmor
  • KubeArmor
  • Quick Links
    • Getting Started
    • Support Matrix
    • Differentiation
    • VM/Bare-Metal Deployment
  • Use-Cases
    • Harden Infrastructure
    • Least Permissive Access
    • Application Behavior
    • ModelArmor Use Cases
    • Advanced
  • Documentation
    • KubeArmor Events
    • Control Telemetry/Visibility
    • Security Posture
    • Policy Spec for Containers
    • Policy Examples for Containers
    • Cluster Policy Spec for Containers
    • Cluster Policy Examples for Containers
    • Policy Spec for Nodes/VMs
    • Policy Examples for Nodes/VMs
    • FAQs
  • Contribution
    • Contribution Guide
    • Development Guide
    • Testing Guide
Powered by GitBook
On this page
  • Architecture Overview
  • Documentation
  • Notice/Credits
  • CNCF
  • ROADMAP

Was this helpful?

Export as PDF

KubeArmor

NextGetting Started

Last updated 8 months ago

Was this helpful?

KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level.

KubeArmor leverages such as , , or to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF.





Architecture Overview

Biweekly Meeting

CNCF

ROADMAP

Protect critical paths such as cert bundles MITRE, STIGs, CIS based rules Restrict access to raw DB table

Process Whitelisting Network Whitelisting Control access to sensitive assets

Process execs, File System accesses Service binds, Ingress, Egress connections Sensitive system call profiling

Kubernetes Deployment Containerized Deployment VM/Bare-Metal Deployment

Documentation

Security Policy for Pods/Containers [] []

Cluster level security Policy for Pods/Containers [] []

Security Policy for Hosts/Nodes [] [] ...

Contributors

,

Minutes:

Calendar invite: ,

Notice/Credits

KubeArmor uses 's system call utility functions.

KubeArmor is of the Cloud Native Computing Foundation.

KubeArmor roadmap is tracked via

📓
👥
🤝
👉
Getting Started
🎯
Use Cases
✔️
KubeArmor Support Matrix
♟️
How is KubeArmor different?
📜
Spec
Examples
📜
Spec
Examples
📜
Spec
Examples
detailed documentation
📘
Contribution Guide
🧑‍💻
Development Guide
Testing Guide
✋
Join KubeArmor Slack
❓
FAQs
🗣️
Zoom Link
📄
Document
📆
Google Calendar
ICS file
Tracee
KubeArmor Projects
⛓️
📋
🛅
🚥
🚥
🎛️
🧬
🧭
🔬
☸️
🐋
💻
💪
Harden Infrastructure
💍
Least Permissive Access
🔭
Application Behavior
❄️
Deployment Models
Linux security modules (LSMs)
AppArmor
SELinux
BPF-LSM
Sandbox Project
KubeArmor High Level Design