The Kubernetes Bench for Security is a Go application that checks whether Kubernetes is deployed according to security best practices.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
Go to file
Chris Renzo a34047c105
Adding eks-stig-kubernetes-v1r6 (#1266)
2 years ago
.github Bump actions/setup-python from 3 to 4 (#1208) 2 years ago
cfg Adding eks-stig-kubernetes-v1r6 (#1266) 2 years ago
check ASFF: add node name to the finding id (#1214) 2 years ago
cmd use log instead of print (#1186) 2 years ago
docs Adding eks-stig-kubernetes-v1r6 (#1266) 2 years ago
hack Adding eks-stig-kubernetes-v1r6 (#1266) 2 years ago
hooks adds kube-bench version to docker build hook (#524) 4 years ago
integration/testdata Adding eks-stig-kubernetes-v1r6 (#1266) 2 years ago
internal/findings Aws asff (#770) 3 years ago
.gitignore release: prepare v0.6.7-rc1 (#1136) 2 years ago
.golangci.yaml chore(lint): setup golangci-lint (#1144) 2 years ago
.goreleaser.yml chore: add s390x arch (#1097) 2 years ago
.yamllint.yaml Support Linting YAML as part of Travis CI build (#554) 4 years ago
CONTRIBUTING.md Adding eks-stig-kubernetes-v1r6 (#1266) 2 years ago
Dockerfile chore: replace gclib alpine pkg (#1280) 2 years ago
Dockerfile.ubi8 build(deps): bump golang from 1.18.3 to 1.19.0 (#1237) 2 years ago
LICENSE Initial commit 7 years ago
NOTICE Create NOTICE (#199) 5 years ago
OWNERS Create OWNERS 7 years ago
README.md Remove broken badges and add link for some badges (#1083) 2 years ago
codecov.yml Improve Proxykubeconfig tests (#708) 4 years ago
entrypoint.sh Set -e to fail fast 6 years ago
go.mod build(deps): bump github.com/aws/aws-sdk-go from 1.44.86 to 1.44.91 (#1269) 2 years ago
go.sum build(deps): bump github.com/aws/aws-sdk-go from 1.44.86 to 1.44.91 (#1269) 2 years ago
job-ack.yaml fix: fully qualified image names (#1206) 2 years ago
job-aks.yaml fix: fully qualified image names (#1206) 2 years ago
job-eks-asff.yaml ASFF: add node name to the finding id (#1214) 2 years ago
job-eks-stig.yaml Adding eks-stig-kubernetes-v1r6 (#1266) 2 years ago
job-eks.yaml fix: fully qualified image names (#1206) 2 years ago
job-gke.yaml fix: fully qualified image names (#1206) 2 years ago
job-iks.yaml fix: fully qualified image names (#1206) 2 years ago
job-master.yaml Update job-master.yaml for K8s 1.24.x labels/tolerations (#1250) (#1251) 2 years ago
job-node.yaml fix: fully qualified image names (#1206) 2 years ago
job.yaml release: prepare v0.6.9 (#1241) 2 years ago
main.go Fix issue #16 about supporting verbosity. 7 years ago
makefile Adding eks-stig-kubernetes-v1r6 (#1266) 2 years ago
mkdocs.yml Fixing typos (#899) 3 years ago

README.md

GitHub Release Downloads Docker Pulls Go Report Card Build Status License Coverage Status

kube-bench logo

kube-bench is a tool that checks whether Kubernetes is deployed securely by running the checks documented in the CIS Kubernetes Benchmark.

Tests are configured with YAML files, making this tool easy to update as test specifications evolve.

Kubernetes Bench for Security

Quick start

There are multiple ways to run kube-bench. You can run kube-bench inside a pod, but it will need access to the host's PID namespace in order to check the running processes, as well as access to some directories on the host where config files and other files are stored.

The supplied job.yaml file can be applied to run the tests as a job. For example:

$ kubectl apply -f job.yaml
job.batch/kube-bench created

$ kubectl get pods
NAME                      READY   STATUS              RESTARTS   AGE
kube-bench-j76s9   0/1     ContainerCreating   0          3s

# Wait for a few seconds for the job to complete
$ kubectl get pods
NAME                      READY   STATUS      RESTARTS   AGE
kube-bench-j76s9   0/1     Completed   0          11s

# The results are held in the pod's logs
kubectl logs kube-bench-j76s9
[INFO] 1 Master Node Security Configuration
[INFO] 1.1 API Server
...

For more information and different ways to run kube-bench see documentation

Please Note

  1. kube-bench implements the CIS Kubernetes Benchmark as closely as possible. Please raise issues here if kube-bench is not correctly implementing the test as described in the Benchmark. To report issues in the Benchmark itself (for example, tests that you believe are inappropriate), please join the CIS community.

  2. There is not a one-to-one mapping between releases of Kubernetes and releases of the CIS benchmark. See CIS Kubernetes Benchmark support to see which releases of Kubernetes are covered by different releases of the benchmark.

By default, kube-bench will determine the test set to run based on the Kubernetes version running on the machine.

Contributing

Kindly read Contributing before contributing. We welcome PRs and issue reports.

Roadmap

Going forward we plan to release updates to kube-bench to add support for new releases of the CIS Benchmark. Note that these are not released as frequently as Kubernetes releases.