Bumps [docker/setup-qemu-action](https://github.com/docker/setup-qemu-action) from 2 to 3. - [Release notes](https://github.com/docker/setup-qemu-action/releases) - [Commits](https://github.com/docker/setup-qemu-action/compare/v2...v3) --- updated-dependencies: - dependency-name: docker/setup-qemu-action dependency-type: direct:production update-type: version-update:semver-major ... Signed-off-by: dependabot[bot] <email@example.com>
|18 hours ago|
|.github||18 hours ago|
|cfg||3 months ago|
|check||5 months ago|
|cmd||4 months ago|
|docs||4 months ago|
|hack||1 year ago|
|hooks||4 years ago|
|integration/testdata||1 year ago|
|internal/findings||1 year ago|
|.gitignore||2 years ago|
|.golangci.yaml||2 years ago|
|.goreleaser.yml||6 months ago|
|.yamllint.yaml||4 years ago|
|CONTRIBUTING.md||1 year ago|
|Dockerfile||2 weeks ago|
|Dockerfile.fips.ubi||2 weeks ago|
|Dockerfile.ubi||2 weeks ago|
|LICENSE||6 years ago|
|NOTICE||5 years ago|
|OWNERS||6 years ago|
|README.md||1 day ago|
|codecov.yml||3 years ago|
|entrypoint.sh||5 years ago|
|fipsonly.go||2 months ago|
|go.mod||5 months ago|
|go.sum||4 months ago|
|job-ack.yaml||1 year ago|
|job-aks.yaml||1 year ago|
|job-eks-asff.yaml||4 months ago|
|job-eks-stig.yaml||1 year ago|
|job-eks.yaml||4 months ago|
|job-gke.yaml||1 year ago|
|job-iks.yaml||1 year ago|
|job-master.yaml||1 year ago|
|job-node.yaml||1 year ago|
|job-tkgi.yaml||4 months ago|
|job.yaml||2 months ago|
|main.go||6 years ago|
|makefile||2 months ago|
|mkdocs.yml||2 years ago|
kube-bench is a tool that checks whether Kubernetes is deployed securely by running the checks documented in the CIS Kubernetes Benchmark.
Tests are configured with YAML files, making this tool easy to update as test specifications evolve.
CIS Scanning as part of Trivy and the Trivy Operator
Trivy, the all in one cloud native security scanner, can be deployed as a Kubernetes Operator inside a cluster. Both, the Trivy CLI, and the Trivy Operator support CIS Kubernetes Benchmark scanning among several other features.
There are multiple ways to run kube-bench. You can run kube-bench inside a pod, but it will need access to the host's PID namespace in order to check the running processes, as well as access to some directories on the host where config files and other files are stored.
job.yaml file can be applied to run the tests as a job. For example:
$ kubectl apply -f job.yaml job.batch/kube-bench created $ kubectl get pods NAME READY STATUS RESTARTS AGE kube-bench-j76s9 0/1 ContainerCreating 0 3s # Wait for a few seconds for the job to complete $ kubectl get pods NAME READY STATUS RESTARTS AGE kube-bench-j76s9 0/1 Completed 0 11s # The results are held in the pod's logs kubectl logs kube-bench-j76s9 [INFO] 1 Master Node Security Configuration [INFO] 1.1 API Server ...
For more information and different ways to run kube-bench see documentation
kube-bench implements the CIS Kubernetes Benchmark as closely as possible. Please raise issues here if kube-bench is not correctly implementing the test as described in the Benchmark. To report issues in the Benchmark itself (for example, tests that you believe are inappropriate), please join the CIS community.
There is not a one-to-one mapping between releases of Kubernetes and releases of the CIS benchmark. See CIS Kubernetes Benchmark support to see which releases of Kubernetes are covered by different releases of the benchmark.
By default, kube-bench will determine the test set to run based on the Kubernetes version running on the machine.
- see the following documentation on Running kube-bench for more details.
Kindly read Contributing before contributing. We welcome PRs and issue reports.
Going forward we plan to release updates to kube-bench to add support for new releases of the CIS Benchmark. Note that these are not released as frequently as Kubernetes releases.