arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

KubeArmor

arrow-up-rightarrow-up-rightarrow-up-rightarrow-up-rightarrow-up-rightarrow-up-rightarrow-up-rightarrow-up-rightarrow-up-rightarrow-up-right

KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level.

KubeArmor leverages Linux security modules (LSMs)arrow-up-right such as AppArmorarrow-up-right, SELinuxarrow-up-right, or BPF-LSMarrow-up-right to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF.

💪


⛓️ Protect critical paths such as cert bundles 📋 MITRE, STIGs, CIS based rules 🛅 Restrict access to raw DB table

hashtag
Architecture Overview

hashtag
Documentation 📓

  • 👉

  • 🎯

  • ✔️

hashtag
Contributors 👥

  • 📘

  • 🧑‍💻 ,

  • ✋

hashtag
Biweekly Meeting

  • 🗣️

  • 📄 Minutes:

  • 📆 Calendar invite: ,

hashtag
Notice/Credits 🤝

  • KubeArmor uses 's system call utility functions.

hashtag
CNCF

KubeArmor is of the Cloud Native Computing Foundation.

hashtag
ROADMAP

KubeArmor roadmap is tracked via

♟️ How is KubeArmor different?

  • 📜 Security Policy for Pods/Containers [Spec] [Examples]

  • 📜 Cluster level security Policy for Pods/Containers [Spec] [Examples]

  • 📜 Security Policy for Hosts/Nodes [Spec] [Examples] ... detailed documentationarrow-up-right

  • ❓ FAQs

  • 💍 Least Permissive Access


    🚥 Process Whitelisting 🚥 Network Whitelisting 🎛️ Control access to sensitive assets

    🔭 Application Behavior


    🧬 Process execs, File System accesses 🧭 Service binds, Ingress, Egress connections 🔬 Sensitive system call profiling

    ❄️ Deployment Modelsarrow-up-right


    ☸️ Kubernetes Deployment 🐋 Containerized Deployment 💻 VM/Bare-Metal Deployment

    Getting Started
    Use Cases
    KubeArmor Support Matrix
    Contribution Guide
    Development Guide
    Testing Guide
    Join KubeArmor Slackarrow-up-right
    Zoom Linkarrow-up-right
    Documentarrow-up-right
    Google Calendararrow-up-right
    ICS filearrow-up-right
    Traceearrow-up-right
    Sandbox Projectarrow-up-right
    KubeArmor Projectsarrow-up-right
    Harden Infrastructure
    KubeArmor High Level Design
    CNCF SandBox Project
    Build Status
    FOSSA Status
    FOSSA Status
    Discussions
    ArtifactHub
    Docker Downloads
    Slack
    CLOMonitor
    OpenSSF Scorecard
    CII Best Practices