All pages
Powered by GitBook
1 of 1

Loading...

KubeArmor

KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level.

KubeArmor leverages Linux security modules (LSMs) such as AppArmor, SELinux, or BPF-LSM to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF.

πŸ’ͺ


⛓️ Protect critical paths such as cert bundles πŸ“‹ MITRE, STIGs, CIS based rules πŸ›… Restrict access to raw DB table

πŸ’


πŸš₯ Process Whitelisting πŸš₯ Network Whitelisting πŸŽ›οΈ Control access to sensitive assets

πŸ”­


🧬 Process execs, File System accesses 🧭 Service binds, Ingress, Egress connections πŸ”¬ Sensitive system call profiling

❄️


☸️ Kubernetes Deployment πŸ‹ Containerized Deployment πŸ’» VM/Bare-Metal Deployment

Architecture Overview

KubeArmor High Level Design

Documentation πŸ““

  • πŸ‘‰ Getting Started

  • 🎯 Use Cases

  • βœ”οΈ KubeArmor Support Matrix

  • β™ŸοΈ How is KubeArmor different?

  • πŸ“œ Security Policy for Pods/Containers [Spec] [Examples]

  • πŸ“œ Cluster level security Policy for Pods/Containers [Spec] [Examples]

  • πŸ“œ Security Policy for Hosts/Nodes [Spec] [Examples] ... detailed documentation

Contributors πŸ‘₯

  • πŸ“˜ Contribution Guide

  • πŸ§‘β€πŸ’» Development Guide, Testing Guide

  • βœ‹ Join KubeArmor Slack

  • ❓ FAQs

Biweekly Meeting

  • πŸ—£οΈ Zoom Link

  • πŸ“„ Minutes: Document

  • πŸ“† Calendar invite: Google Calendar, ICS file

Notice/Credits 🀝

  • KubeArmor uses Tracee's system call utility functions.

CNCF

KubeArmor is Sandbox Project of the Cloud Native Computing Foundation.

ROADMAP

KubeArmor roadmap is tracked via KubeArmor Projects

Harden Infrastructure
Least Permissive Access
Application Behavior
Deployment Models