KubeArmor
Last updated
Was this helpful?
Last updated
Was this helpful?
KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level.
KubeArmor leverages such as , , or to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF.
🔭 https://github.com/kubearmor/KubeArmor/blob/main/getting-started/workload_visibility.md 🧬 Process execs, File System accesses 🧭 Service binds, Ingress, Egress connections 🔬 Sensitive system call profiling
❄️ https://github.com/kubearmor/KubeArmor/blob/main/getting-started/deployment_models.md ☸️ Kubernetes Deployment🐋 Containerized Deployment💻 VM/Bare-Metal Deployment
👉
🎯
✔️
♟️
📜 Security Policy for Pods/Containers [] []
📜 Security Policy for Hosts/Nodes [] [] ...
📘
🧑💻 ,
✋
❓
🗣️
📄 Minutes:
📆 Calendar invite: ,
KubeArmor uses 's system call utility functions.
KubeArmor is of the Cloud Native Computing Foundation.