Guest post originally published on the ARMO blog by Ben Hirschberg, VP R&D & Co-founder, ARMO

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have published comprehensive recommendations for strengthening the security of an organization’s Kubernetes system to help companies make their Kubernetes environment more difficult to compromise.

This 52-page cybersecurity technical report offers practical guidance for admins to manage Kubernetes securely, focusing on the common sources for a compromised Kubernetes environment.

To learn more visit kubescape GitHub page

Kubescape is based on OPA engine: https://github.com/open-policy-agent/opa and ARMO’s posture controls.

Kubescape retrieves the Kubernetes objects from the API server and scan them by running a set of regos snippets developed by ARMO.

It establishes how well your Kubernetes configurations meet the best practice recommendations from the NSA and CISA guidance. 

The output results are printed in a “console friendly” manner by default, but they can be also retrieved in JSON format for further processing.

Example test output from kubescape
Example test output from kubescape

Kubescape is running the following tests according to what is defined Kubernetes Hardening Guidance byto NSA and CISA. More tests will be added soon – stay tuned!

Kubescape is an open-source project, we welcome your feedback and ideas for improvement. We’re also aiming to collaborate with the Kubernetes community to help make the tests themselves more robust and complete as Kubernetes develops.