Skip to content

Cloud-native Runtime Security Enforcement System. Workload hardening and implementing least-permissive policies made easy.

License

Notifications You must be signed in to change notification settings

5GSEC/5G-KubeArmor

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Build Status CII Best Practices CLOMonitor OpenSSF Scorecard FOSSA Status FOSSA Status Slack Discussions Docker Downloads ArtifactHub

KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level.

KubeArmor leverages Linux security modules (LSMs) such as AppArmor, SELinux, or BPF-LSM to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF.

💪 Harden Infrastructure
⛓️ Protect critical paths such as cert bundles
📋 MITRE, STIGs, CIS based rules
🛅 Restrict access to raw DB table
💍 Least Permissive Access
🚥 Process Whitelisting
🚥 Network Whitelisting
🎛️ Control access to sensitive assets
🔭 Application Behavior
🧬 Process execs, File System accesses
🧭 Service binds, Ingress, Egress connections
🔬 Sensitive system call profiling
❄️ Deployment Models
☸️ Kubernetes Deployment
🐋 Containerized Deployment
💻 VM/Bare-Metal Deployment

Architecture Overview

KubeArmor High Level Design

Documentation 📓

Contributors 👥

Biweekly Meeting

Notice/Credits 🤝

  • KubeArmor uses Tracee's system call utility functions.

CNCF

KubeArmor is Sandbox Project of the Cloud Native Computing Foundation. CNCF SandBox Project

ROADMAP

KubeArmor roadmap is tracked via KubeArmor Projects

About

Cloud-native Runtime Security Enforcement System. Workload hardening and implementing least-permissive policies made easy.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Go 75.0%
  • Shell 10.9%
  • C 7.3%
  • HTML 4.0%
  • Makefile 2.2%
  • Dockerfile 0.6%