Skip to content

Commit f8a135a

Browse files
committed
f
1 parent 7491e2b commit f8a135a

1 file changed

Lines changed: 39 additions & 2 deletions

File tree

  • src/pentesting-cloud/kubernetes-security/kubernetes-hardening

src/pentesting-cloud/kubernetes-security/kubernetes-hardening/README.md

Lines changed: 39 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,35 @@
44

55
## Tools to analyse a cluster
66

7+
### [**Steampipe - Kubernetes Compliance](https://github.com/turbot/steampipe-mod-kubernetes-compliance)
8+
9+
It's will **several compliance checks over the Kubernetes cluster**. It includes support for CIS, National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity technical report for Kubernetes hardening.
10+
11+
```bash
12+
# Install Steampipe
13+
brew install turbot/tap/powerpipe
14+
brew install turbot/tap/steampipe
15+
steampipe plugin install kubernetes
16+
17+
# Start the service
18+
steampipe service start
19+
20+
# Install the module
21+
mkdir dashboards
22+
cd dashboards
23+
powerpipe mod init
24+
powerpipe mod install github.com/turbot/steampipe-mod-kubernetes-compliance
25+
26+
# Run the module
27+
powerpipe server
28+
```
29+
730
### [**Kubescape**](https://github.com/armosec/kubescape)
831

932
[**Kubescape**](https://github.com/armosec/kubescape) is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning. Kubescape scans K8s clusters, YAML files, and HELM charts, detecting misconfigurations according to multiple frameworks (such as the [NSA-CISA](https://www.armosec.io/blog/kubernetes-hardening-guidance-summary-by-armo) , [MITRE ATT\&CK®](https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/)), software vulnerabilities, and RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline, calculates risk score instantly and shows risk trends over time.
1033

1134
```bash
35+
curl -s https://raw.githubusercontent.com/kubescape/kubescape/master/install.sh | /bin/bash
1236
kubescape scan --verbose
1337
```
1438

@@ -24,7 +48,7 @@ You can choose to:
2448

2549
### [**Kubeaudit**](https://github.com/Shopify/kubeaudit)
2650

27-
The tool [**kubeaudit**](https://github.com/Shopify/kubeaudit) is a command line tool and a Go package to **audit Kubernetes clusters** for various different security concerns.
51+
**[DEPRECATED]** The tool [**kubeaudit**](https://github.com/Shopify/kubeaudit) is a command line tool and a Go package to **audit Kubernetes clusters** for various different security concerns.
2852

2953
Kubeaudit can detect if it is running within a container in a cluster. If so, it will try to audit all Kubernetes resources in that cluster:
3054

@@ -36,14 +60,27 @@ This tool also has the argument `autofix` to **automatically fix detected issues
3660

3761
### [**Kube-hunter**](https://github.com/aquasecurity/kube-hunter)
3862

39-
The tool [**kube-hunter**](https://github.com/aquasecurity/kube-hunter) hunts for security weaknesses in Kubernetes clusters. The tool was developed to increase awareness and visibility for security issues in Kubernetes environments.
63+
**[DEPRECATED]** The tool [**kube-hunter**](https://github.com/aquasecurity/kube-hunter) hunts for security weaknesses in Kubernetes clusters. The tool was developed to increase awareness and visibility for security issues in Kubernetes environments.
4064

4165
```bash
4266
kube-hunter --remote some.node.com
4367
```
4468

69+
### [Trivy](https://github.com/aquasecurity/trivy)
70+
71+
[Trivy](https://github.com/aquasecurity/trivy) has scanners that look for security issues, and targets where it can find those issues:
72+
73+
- Container Image
74+
- Filesystem
75+
- Git Repository (remote)
76+
- Virtual Machine Image
77+
- Kubernetes
78+
79+
4580
### [**Kubei**](https://github.com/Erezf-p/kubei)
4681

82+
**[Looks like unmantained]**
83+
4784
[**Kubei**](https://github.com/Erezf-p/kubei) is a vulnerabilities scanning and CIS Docker benchmark tool that allows users to get an accurate and immediate risk assessment of their kubernetes clusters. Kubei scans all images that are being used in a Kubernetes cluster, including images of application pods and system pods.
4885

4986
### [**KubiScan**](https://github.com/cyberark/KubiScan)

0 commit comments

Comments
 (0)