Skip to main content

Kubescape

Kubescape is an open-source tool for performing security assessments of Kubernetes clusters, manifests, and Helm charts. It helps identify misconfigurations, compliance violations, and risks based on industry standards like the NSA-CISA Kubernetes Hardening Guide, MITRE ATT&CK, and CIS Benchmarks.

Kubescape is suitable for both continuous integration environments and runtime environments, providing shift-left and runtime visibility. It is maintained by ARMO and widely adopted in the cloud-native ecosystem.


Use Cases

  • Validate Kubernetes clusters against established security benchmarks.
  • Scan Kubernetes YAML manifests and Helm charts during CI pipelines.
  • Continuously monitor for compliance drift and configuration risks.
  • Integrate with GitOps workflows to enforce secure configurations pre-deployment.

Usage Examples

Scan a Live Cluster

kubescape scan --submit --enable-host-scan

Scan Kubernetes YAML Manifests

kubescape scan framework nsa --file path/to/deployment.yaml

Scan Using a Specific Framework

kubescape scan framework cis

Output as JSON or JUnit (for CI integration)

kubescape scan --format json --output results.json

Best Practices

  • Integrate into CI/CD pipelines: Scan manifests before they are applied to the cluster to catch misconfigurations early.
  • Choose relevant frameworks: Use the appropriate framework (CIS, NSA, MITRE) based on your compliance or security goals.
  • Enable host scanning: If permitted, include host-level scanning for deeper visibility into cluster risks.
  • Automate periodic scans: Schedule scans against running clusters to detect configuration drift.
  • Use GitHub Actions or similar plugins: Embed Kubescape in automated workflows for continuous security assurance.

References