Skip to content

Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (BPF-LSM, AppArmor).

License

Notifications You must be signed in to change notification settings

krisharyan117/KubeArmor

This branch is 326 commits behind kubearmor/KubeArmor:main.

Folders and files

NameName
Last commit message
Last commit date
Sep 22, 2023
Apr 30, 2024
Apr 30, 2024
Apr 17, 2024
May 1, 2024
Jan 19, 2023
Apr 24, 2024
Apr 17, 2024
Apr 9, 2024
Apr 17, 2024
Nov 9, 2022
Mar 7, 2024
Jul 19, 2022
Jul 9, 2022
Feb 8, 2024
Jan 27, 2023
Dec 29, 2021
Apr 27, 2022
Apr 11, 2024
Sep 7, 2023
Aug 19, 2023
Jun 22, 2021
Mar 8, 2024
Apr 23, 2024
Jan 25, 2024
Apr 22, 2024
Apr 23, 2024
Mar 7, 2024

Repository files navigation

Build Status CII Best Practices CLOMonitor OpenSSF Scorecard FOSSA Status FOSSA Status Slack Discussions Docker Downloads ArtifactHub

KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level.

KubeArmor leverages Linux security modules (LSMs) such as AppArmor, SELinux, or BPF-LSM to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF.

πŸ’ͺ Harden Infrastructure
⛓️ Protect critical paths such as cert bundles
πŸ“‹ MITRE, STIGs, CIS based rules
πŸ›… Restrict access to raw DB table
πŸ’ Least Permissive Access
πŸš₯ Process Whitelisting
πŸš₯ Network Whitelisting
πŸŽ›οΈ Control access to sensitive assets
πŸ”­ Application Behavior
🧬 Process execs, File System accesses
🧭 Service binds, Ingress, Egress connections
πŸ”¬ Sensitive system call profiling
❄️ Deployment Models
☸️ Kubernetes Deployment
πŸ‹ Containerized Deployment
πŸ’» VM/Bare-Metal Deployment

Architecture Overview

KubeArmor High Level Design

Documentation πŸ““

Contributors πŸ‘₯

Biweekly Meeting

Notice/Credits 🀝

  • KubeArmor uses Tracee's system call utility functions.

CNCF

KubeArmor is Sandbox Project of the Cloud Native Computing Foundation. CNCF SandBox Project

ROADMAP

KubeArmor roadmap is tracked via KubeArmor Projects

About

Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (BPF-LSM, AppArmor).

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Go 76.4%
  • Shell 10.2%
  • C 7.1%
  • HTML 3.6%
  • Makefile 2.0%
  • Dockerfile 0.6%
  • Smarty 0.1%