githubEdit

KubeArmor

Build Statusarrow-up-rightCII Best Practicesarrow-up-rightCLOMonitorarrow-up-rightOpenSSF Scorecardarrow-up-rightFOSSA Statusarrow-up-rightFOSSA Statusarrow-up-rightSlackarrow-up-rightDiscussionsarrow-up-rightDocker Downloadsarrow-up-rightArtifactHubarrow-up-right

KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level.

KubeArmor leverages Linux security modules (LSMs)arrow-up-right such as AppArmorarrow-up-right, SELinuxarrow-up-right, or BPF-LSMarrow-up-right to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF.

💪 Harden Infrastructure


⛓️ Protect critical paths such as cert bundles 📋 MITRE, STIGs, CIS based rules 🛅 Restrict access to raw DB table

💍 Least Permissive Access


🚥 Process Whitelisting 🚥 Network Whitelisting 🎛️ Control access to sensitive assets

🔭 Application Behavior


🧬 Process execs, File System accesses 🧭 Service binds, Ingress, Egress connections 🔬 Sensitive system call profiling

❄️ Deployment Modelsarrow-up-right


☸️ Kubernetes Deployment 🐋 Containerized Deployment 💻 VM/Bare-Metal Deployment

Architecture Overview

KubeArmor High Level Design

Documentation 📓

Contributors 👥

Biweekly Meeting

Notice/Credits 🤝

CNCF

KubeArmor is Sandbox Projectarrow-up-right of the Cloud Native Computing Foundation.CNCF SandBox Project

ROADMAP

KubeArmor roadmap is tracked via KubeArmor Projectsarrow-up-right

Last updated

Was this helpful?