Compare commits

..

7 Commits

Author SHA1 Message Date
Benyamin Hirschberg
bc61755f67 Update install.sh 2021-08-15 21:46:37 +03:00
Benyamin Hirschberg
c462d1ec2f Update build.yaml 2021-08-15 21:43:11 +03:00
Benyamin Hirschberg
203d43347e optimize release 2021-08-15 21:40:39 +03:00
Benyamin Hirschberg
d102789a35 Update README.md 2021-08-15 21:34:01 +03:00
Benyamin Hirschberg
28b431c623 Update README.md 2021-08-15 21:33:15 +03:00
Benyamin Hirschberg
2fb1fef6d5 Merge pull request #2 from BenHirschbergCa/dev
updating image + gif v
2021-08-15 21:21:45 +03:00
Ben Hirschberg
091a811fa1 updating image + gif v 2021-08-15 21:19:56 +03:00
5 changed files with 24 additions and 7 deletions

View File

@@ -18,7 +18,7 @@ jobs:
go-version: 1.16
- name: Build
run: mkdir build && go mod tidy && go build -o build/kubescape
run: mkdir build && go mod tidy && go build -ldflags "-w -s" -o build/kubescape
- name: Chmod
run: chmod +x build/kubescape

View File

@@ -1,8 +1,9 @@
<img src="docs/kubescape.png" width="300" alt="logo" align="center">
kubescape is a tool for testing Kubernetes clusters against industry accepted security standards and recomendations like:
* NSA hardening for Kubernetes operators [see here](https://media.defense.gov/2021/Aug/03/2002820425/-1/-1/1/CTR_KUBERNETES%20HARDENING%20GUIDANCE.PDF)
* MITRE threat matrix for Kubernetes [see here](https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/)
Kubescape is the first tool for testing if Kubernetes is deployed securely as defined in [Kubernetes Hardening Guidance by to NSA and CISA](https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2716980/nsa-cisa-release-kubernetes-hardening-guidance/)
Tests are configured with YAML files, making this tool easy to update as test specifications evolve.
<img src="docs/using-mov.gif">
# TL;DR
## Installation
@@ -29,11 +30,27 @@ To get a fast check of the security posture of your Kubernetes cluster, run this
# Under the hood
## Tests
Defining the tests here...
Kubescape is running the following tests according to what is defined by [Kubernetes Hardening Guidance by to NSA and CISA](https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2716980/nsa-cisa-release-kubernetes-hardening-guidance/)
* Non-root containers
* Immutable container filesystem
* Building secure container images
* Privileged containers
* hostPID, hostIPC privileges
* hostNetwork access
* allowedHostPaths field
* Protecting pod service account tokens
* Pods in kube-system and kube-public
* Resource policies
* Control plane hardening
* Encrypted secrets
* Anonymous Requests
## Technology
Kubescape based on OPA engine: https://github.com/open-policy-agent/opa and ARMO's posture controls.
The tools retrieves Kubernetes objects from the API server and runs a set of [regos snippets](https://www.openpolicyagent.org/docs/latest/policy-language/) developed by (ARMO)[https://www.armosec.io/].
The tools retrieves Kubernetes objects from the API server and runs a set of [regos snippets](https://www.openpolicyagent.org/docs/latest/policy-language/) developed by [ARMO](https://www.armosec.io/).
The results by default printed in a pretty "console friendly" manner, but they can be retrieved in JSON format for further processing.
Kubescape is an open source project, we welcome your feedback and ideas for improvement. Were also aiming to collaborate with the Kubernetes community to help make the tests themselves more robust and complete as Kubernetes develops.

Binary file not shown.

Before

Width:  |  Height:  |  Size: 34 KiB

After

Width:  |  Height:  |  Size: 44 KiB

BIN
docs/using-mov.gif Executable file

Binary file not shown.

After

Width:  |  Height:  |  Size: 161 KiB

View File

@@ -6,7 +6,7 @@ echo
BASE_DIR=~/.kubescape
KUBESCAPE_EXEC=kubescape
RELEASE=v0.0.12
RELEASE=v0.0.18
DOWNLOAD_URL="https://github.com/armosec/kubescape/releases/download/$RELEASE/kubescape"
mkdir -p $BASE_DIR