Kubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning. Kubescape scans K8s clusters, YAML files, and HELM charts, detecting misconfigurations according to multiple frameworks (such as the NSA-CISA , MITRE ATT&CK®), software vulnerabilities, and RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline, calculates risk score instantly and shows risk trends over time. It became one of the fastest-growing Kubernetes tools among developers due to its easy-to-use CLI interface, flexible output formats, and automated scanning capabilities, saving Kubernetes users and admins’ precious time, effort, and resources. Kubescape integrates natively with other DevOps tools, including Jenkins, CircleCI, Github workflows, Prometheus, and Slack, and supports multi-cloud K8s deployments like EKS, GKE, and AKS.
TL;DR
Install:
curl -s https://raw.githubusercontent.com/armosec/kubescape/master/install.sh | /bin/bash
Run:
kubescape scan --submit --enable-host-scan
Kubescape is an open source project, we welcome your feedback and ideas for improvement. We’re also aiming to collaborate with the Kubernetes community to help make the tests themselves more robust and complete as Kubernetes develops.
Click 👍 if you want us to continue to develop and improve Kubescape 😀
Being part of the team
We invite you to our team! We are excited about this project and want to return the love we get.
Want to contribute? Want to discuss something? Have an issue?
- Open a issue, we are trying to respond within 48 hours
- Join us in a discussion on our discord server!
Options and examples
Playground
Tutorials
- Overview
- How To Secure Kubernetes Clusters With Kubescape And Armo
- Scan Kubernetes YAML files
- Scan Kubescape on an air-gapped environment (offline support)
- Managing exceptions in the Kubescape SaaS version
- Configure and run customized frameworks
- Customize controls configurations. Kubescape CLI, Kubescape SaaS
Install on Windows
Requires powershell v5.0+
iwr -useb https://raw.githubusercontent.com/armosec/kubescape/master/install.ps1 | iex
Note: if you get an error you might need to change the execution policy (i.e. enable Powershell) with
Set-ExecutionPolicy RemoteSigned -scope CurrentUser
Install on macOS
-
brew tap armosec/kubescape -
brew install kubescape
Usage & Examples
Examples
Scan a running Kubernetes cluster and submit results to the Kubescape SaaS version
kubescape scan --submit
Scan a running Kubernetes cluster with nsa framework and submit results to the Kubescape SaaS version
kubescape scan framework nsa --submit
Scan a running Kubernetes cluster with MITRE ATT&CK® framework and submit results to the Kubescape SaaS version
kubescape scan framework mitre --submit
Scan a running Kubernetes cluster with a specific control using the control name or control ID. List of controls
kubescape scan control "Privileged container"
Scan specific namespaces
kubescape scan --include-namespaces development,staging,production
Scan cluster and exclude some namespaces
kubescape scan --exclude-namespaces kube-system,kube-public
Scan local yaml/json files before deploying. Take a look at the demonstration
kubescape scan *.yaml
Scan kubernetes manifest files from a public github repository
kubescape scan https://github.com/armosec/kubescape
Display all scanned resources (including the resources who passed)
kubescape scan --verbose
Output in json format
kubescape scan --format json --format-version v2 --output results.json
Output in junit xml format
kubescape scan --format junit --output results.xml
Output in pdf format - Contributed by @alegrey91
kubescape scan --format pdf --output results.pdf
Output in prometheus metrics format - Contributed by @Joibel
kubescape scan --format prometheus
Scan with exceptions, objects with exceptions will be presented as exclude and not fail
kubescape scan --exceptions examples/exceptions/exclude-kube-namespaces.json
Scan Helm charts - Render the helm chart using helm template and pass to stdout
helm template [NAME] [CHART] [flags] --dry-run | kubescape scan -
e.g.
helm template bitnami/mysql --generate-name --dry-run | kubescape scan -
Offline/Air-gaped Environment Support
It is possible to run Kubescape offline!
Download all artifacts
- Download and save in local directory, if path not specified, will save all in
~/.kubescape
kubescape download artifacts --output path/to/local/dir
-
Copy the downloaded artifacts to the air-gaped/offline environment
-
Scan using the downloaded artifacts
kubescape scan --use-artifacts-from path/to/local/dir
Download a single artifacts
You can also download a single artifacts and scan with the --use-from flag
- Download and save in file, if file name not specified, will save in
~/.kubescape/<framework name>.json
kubescape download framework nsa --output /path/nsa.json
-
Copy the downloaded artifacts to the air-gaped/offline environment
-
Scan using the downloaded framework
kubescape scan framework nsa --use-from /path/nsa.json
Scan Periodically using Helm - Contributed by @yonahd
Please follow the instructions here helm chart repo
Scan using docker image
Official Docker image quay.io/armosec/kubescape
docker run -v "$(pwd)/example.yaml:/app/example.yaml quay.io/armosec/kubescape scan /app/example.yaml
Submit data manually
Use the submit command if you wish to submit data manually
Submit scan results manually
First, scan your cluster using the json format flag: kubescape scan framework <name> --format json --output path/to/results.json.
Now you can submit the results to the Kubaescape SaaS version -
kubescape submit results path/to/results.json
How to build
Build using python (3.7^) script
Kubescape can be built using:
python build.py
Note: In order to built using the above script, one must set the environment variables in this script:
- RELEASE
- ArmoBEServer
- ArmoERServer
- ArmoWebsite
- ArmoAuthServer
Build using go
Note: development (and the release process) is done with Go 1.17
- Clone Project
git clone https://github.com/armosec/kubescape.git kubescape && cd "$_"
- Build
go build -o kubescape .
- Run
./kubescape scan --submit --enable-host-scan
- Enjoy 🤪
Docker Build
Build your own Docker image
- Clone Project
git clone https://github.com/armosec/kubescape.git kubescape && cd "$_"
- Build
docker build -t kubescape -f build/Dockerfile .
Under the hood
Tests
Kubescape is running the following tests according to what is defined by Kubernetes Hardening Guidance by NSA and CISA
- Non-root containers
- Immutable container filesystem
- Privileged containers
- hostPID, hostIPC privileges
- hostNetwork access
- allowedHostPaths field
- Protecting pod service account tokens
- Resource policies
- Control plane hardening
- Exposed dashboard
- Allow privilege escalation
- Applications credentials in configuration files
- Cluster-admin binding
- Exec into container
- Dangerous capabilities
- Insecure capabilities
- Linux hardening
- Ingress and Egress blocked
- Container hostPort
- Network policies
- Symlink Exchange Can Allow Host Filesystem Access (CVE-2021-25741)
Technology
Kubescape based on OPA engine: https://github.com/open-policy-agent/opa and ARMO's posture controls.
The tools retrieves Kubernetes objects from the API server and runs a set of regos snippets developed by ARMO.
The results by default printed in a pretty "console friendly" manner, but they can be retrieved in JSON format for further processing.
Kubescape is an open source project, we welcome your feedback and ideas for improvement. We’re also aiming to collaborate with the Kubernetes community to help make the tests themselves more robust and complete as Kubernetes develops.
