KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level.
KubeArmor leverages Linux security modules (LSMs) such as AppArmor, SELinux, or BPF-LSM to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF.
πͺ Harden Infrastructure
βοΈ Protect critical paths such as cert bundles
π MITRE, STIGs, CIS based rules
π Restrict access to raw DB table
πLeast Permissive Access
π₯ Process Whitelisting
π₯ Network Whitelisting
ποΈ Control access to sensitive assets
π Application Behavior
𧬠Process execs, File System accesses
π§ Service binds, Ingress, Egress connections
π¬ Sensitive system call profiling
βοΈ Deployment Models
βΈοΈ Kubernetes Deployment
π Containerized Deployment
π» VM/Bare-Metal Deployment
Click the Deploy to DigitalOcean button to install a Kubernetes 1-Click Application. If you aren’t logged in, this link will prompt you to log in with your DigitalOcean account.
In addition to creating KubeArmor using the control panel, you can also use the DigitalOcean API. As an example, to create a 3 node DigitalOcean Kubernetes cluster made up of Basic Droplets in the SFO2 region, you can use the following doctl
command. You need to authenticate with doctl
with your API access token) and replace the $CLUSTER_NAME
variable with the chosen name for your cluster in the command below.
doctl kubernetes clusters create --size s-4vcpu-8gb $CLUSTER_NAME --1-clicks kubearmor-operator
After Deploying see the details on how to utilize your KubeArmor app, you can read more at https://github.com/kubearmor/KubeArmor/blob/main/getting-started/deployment_guide.md.
Refer to https://kubearmor.io/ for more information, join slack channel for support