GithubHelp home page GithubHelp logo

doytsujin / kubescape Goto Github PK

View Code? Open in Web Editor NEW

This project forked from kubescape/kubescape

0.0 1.0 0.0 3.77 MB

kubescape is the first tool for testing if Kubernetes is deployed securely as defined in Kubernetes Hardening Guidance by to NSA and CISA (https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2716980/nsa-cisa-release-kubernetes-hardening-guidance/)

License: Apache License 2.0

Go 97.59% Shell 0.26% Python 1.68% Dockerfile 0.16% PowerShell 0.21% HTML 0.09%

kubescape's Introduction

logo

build Go Report Card

Kubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning. Kubescape scans K8s clusters, YAML files, and HELM charts, detecting misconfigurations according to multiple frameworks (such as the NSA-CISA , MITRE ATT&CK®), software vulnerabilities, and RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline, calculates risk score instantly and shows risk trends over time. It became one of the fastest-growing Kubernetes tools among developers due to its easy-to-use CLI interface, flexible output formats, and automated scanning capabilities, saving Kubernetes users and admins’ precious time, effort, and resources. Kubescape integrates natively with other DevOps tools, including Jenkins, CircleCI, Github workflows, Prometheus, and Slack, and supports multi-cloud K8s deployments like EKS, GKE, and AKS.


TL;DR

Install:

curl -s https://raw.githubusercontent.com/armosec/kubescape/master/install.sh | /bin/bash

Install on windows

Install on macOS

Run:

kubescape scan --submit --enable-host-scan


Kubescape is an open source project, we welcome your feedback and ideas for improvement. We’re also aiming to collaborate with the Kubernetes community to help make the tests themselves more robust and complete as Kubernetes develops.


Click 👍 if you want us to continue to develop and improve Kubescape 😀


Being part of the team

We invite you to our team! We are excited about this project and want to return the love we get.

Want to contribute? Want to discuss something? Have an issue?

  • Open a issue, we are trying to respond within 48 hours
  • Join us in a discussion on our discord server!

logo

Options and examples

Playground

Tutorials

Install on Windows

Requires powershell v5.0+

iwr -useb https://raw.githubusercontent.com/armosec/kubescape/master/install.ps1 | iex

Note: if you get an error you might need to change the execution policy (i.e. enable Powershell) with

Set-ExecutionPolicy RemoteSigned -scope CurrentUser

Install on macOS

  1.  brew tap armosec/kubescape
    
  2.  brew install kubescape
    

Flags

flag default description options
-e/--exclude-namespaces Scan all namespaces Namespaces to exclude from scanning. Recommended to exclude kube-system and kube-public namespaces
--include-namespaces Scan all namespaces Scan specific namespaces
-s/--silent Display progress messages Silent progress messages
-t/--fail-threshold 100 (do not fail) fail command (return exit code 1) if result is above threshold 0 -> 100
-f/--format pretty-printer Output format pretty-printer/json/junit/prometheus
-o/--output print to stdout Save scan result in file
--use-from Load local framework object from specified path. If not used will download latest
--use-artifacts-from Load artifacts (frameworks, control-config, exceptions) from local directory. If not used will download them
--use-default false Load local framework object from default path. If not used will download latest true/false
--exceptions Path to an exceptions obj, examples. Default will download exceptions from Kubescape SaaS
--controls-config Path to a controls-config obj. If not set will download controls-config from ARMO management portal
--submit false If set, Kubescape will send the scan results to Armo management portal where you can see the results in a user-friendly UI, choose your preferred compliance framework, check risk results history and trends, manage exceptions, get remediation recommendations and much more. By default the results are not sent true/false
--keep-local false Kubescape will not send scan results to Armo management portal. Use this flag if you ran with the --submit flag in the past and you do not want to submit your current scan results true/false
--account Armo portal account ID. Default will load account ID from configMap or config file
--kube-context current-context Cluster context to scan
--verbose false Display all of the input resources and not only failed resources true/false
--logger info Set the logger level debug/info/success/warning/error/fatal

Usage & Examples

Examples

Scan a running Kubernetes cluster and submit results to the Kubescape SaaS version

kubescape scan --submit

Scan a running Kubernetes cluster with nsa framework and submit results to the Kubescape SaaS version

kubescape scan framework nsa --submit

Scan a running Kubernetes cluster with MITRE ATT&CK® framework and submit results to the Kubescape SaaS version

kubescape scan framework mitre --submit

Scan a running Kubernetes cluster with a specific control using the control name or control ID. List of controls

kubescape scan control "Privileged container"

Scan specific namespaces

kubescape scan --include-namespaces development,staging,production

Scan cluster and exclude some namespaces

kubescape scan --exclude-namespaces kube-system,kube-public

Scan local yaml/json files before deploying. Take a look at the demonstration

kubescape scan *.yaml

Scan kubernetes manifest files from a public github repository

kubescape scan https://github.com/armosec/kubescape

Display all scanned resources (including the resources who passed)

kubescape scan --verbose

Output in json format

kubescape scan --format json --output results.json

Output in junit xml format

kubescape scan --format junit --output results.xml

Output in prometheus metrics format - Contributed by @Joibel

kubescape scan --format prometheus

Scan with exceptions, objects with exceptions will be presented as exclude and not fail

Full documentation

kubescape scan --exceptions examples/exceptions/exclude-kube-namespaces.json

Scan Helm charts - Render the helm chart using helm template and pass to stdout

helm template [NAME] [CHART] [flags] --dry-run | kubescape scan -

e.g.

helm template bitnami/mysql --generate-name --dry-run | kubescape scan -

Offline/Air-gaped Environment Support

Video tutorial

It is possible to run Kubescape offline!

Download all artifacts

  1. Download and save in local directory, if path not specified, will save all in ~/.kubescape
kubescape download artifacts --output path/to/local/dir
  1. Copy the downloaded artifacts to the air-gaped/offline environment

  2. Scan using the downloaded artifacts

kubescape scan --use-artifacts-from path/to/local/dir

Download a single artifacts

You can also download a single artifacts and scan with the --use-from flag

  1. Download and save in file, if file name not specified, will save in ~/.kubescape/<framework name>.json
kubescape download framework nsa --output /path/nsa.json
  1. Copy the downloaded artifacts to the air-gaped/offline environment

  2. Scan using the downloaded framework

kubescape scan framework nsa --use-from /path/nsa.json

Scan Periodically using Helm - Contributed by @yonahd

Please follow the instructions here helm chart repo

Scan using docker image

Official Docker image quay.io/armosec/kubescape

docker run -v "$(pwd)/example.yaml:/app/example.yaml  quay.io/armosec/kubescape scan /app/example.yaml

Submit data manually

Use the submit command if you wish to submit data manually

Submit scan results manually

First, scan your cluster using the json format flag: kubescape scan framework <name> --format json --output path/to/results.json.

Now you can submit the results to the Kubaescape SaaS version -

kubescape submit results path/to/results.json

How to build

Build using python (3.7^) script

Kubescape can be built using:

python build.py

Note: In order to built using the above script, one must set the environment variables in this script:

  • RELEASE
  • ArmoBEServer
  • ArmoERServer
  • ArmoWebsite
  • ArmoAuthServer

Build using go

Note: development (and the release process) is done with Go 1.17

  1. Clone Project
git clone https://github.com/armosec/kubescape.git kubescape && cd "$_"
  1. Build
go build -o kubescape .
  1. Run
./kubescape scan --submit --enable-host-scan
  1. Enjoy 🤪

Docker Build

Build your own Docker image

  1. Clone Project
git clone https://github.com/armosec/kubescape.git kubescape && cd "$_"
  1. Build
docker build -t kubescape -f build/Dockerfile .

Under the hood

Tests

Kubescape is running the following tests according to what is defined by Kubernetes Hardening Guidance by NSA and CISA

  • Non-root containers
  • Immutable container filesystem
  • Privileged containers
  • hostPID, hostIPC privileges
  • hostNetwork access
  • allowedHostPaths field
  • Protecting pod service account tokens
  • Resource policies
  • Control plane hardening
  • Exposed dashboard
  • Allow privilege escalation
  • Applications credentials in configuration files
  • Cluster-admin binding
  • Exec into container
  • Dangerous capabilities
  • Insecure capabilities
  • Linux hardening
  • Ingress and Egress blocked
  • Container hostPort
  • Network policies
  • Symlink Exchange Can Allow Host Filesystem Access (CVE-2021-25741)

Technology

Kubescape based on OPA engine: https://github.com/open-policy-agent/opa and ARMO's posture controls.

The tools retrieves Kubernetes objects from the API server and runs a set of regos snippets developed by ARMO.

The results by default printed in a pretty "console friendly" manner, but they can be retrieved in JSON format for further processing.

Kubescape is an open source project, we welcome your feedback and ideas for improvement. We’re also aiming to collaborate with the Kubernetes community to help make the tests themselves more robust and complete as Kubernetes develops.

Thanks to all the contributors ❤️

kubescape's People

Contributors

dwertent avatar slashben avatar daniel-grunbergerca avatar bezbran avatar rotemamsa avatar yiscahlevysilas1 avatar avnertzurarmo avatar xdavidel avatar lioralafiarmo avatar moshe-rappaport-ca avatar wim-de-groot avatar saiyam1814 avatar juneezee avatar atzur1091 avatar zc2638 avatar rcohencyberarmor avatar alegrey91 avatar vfarcic avatar tlereste avatar taylor avatar chmod-777-shauli avatar qgervacio avatar pettersolberg88 avatar mayocream avatar mboersma avatar jonaskint avatar anthirian avatar ferhaty avatar clintmod avatar clfs avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.