Kubernetes Security Scanner
A comprehensive security scanner that checks for misconfigurations against CIS Kubernetes Benchmark and NIST SP 800-190 standards
🔐 Security Features
CIS Kubernetes Benchmark
Implements security controls from the Center for Internet Security with comprehensive cluster-admin role usage, privileged container admission, and privilege escalation prevention.
NIST SP 800-190
Follows NIST Application Container Security Guide with image vulnerability management, container runtime security, and network segmentation controls.
Enhanced Terminal UI
Progress bars, typing effects, and colored output for better user experience with vulnerability aggregation and executive summary mode.
Multiple Output Formats
Text, JSON, YAML, and HTML reporting with interactive filtering, detailed findings, and professional styling suitable for presentations.
JSON-Based Rules
External rule definitions in JSON format for easy customization and maintenance without code changes. Supports complex field evaluation and custom operators.
Configurable Rules
Enable/disable specific rules and customize severity levels with extensible architecture for adding new rules and standards.
Namespace Filtering
Scan specific namespaces or exclude system namespaces with support for multiple authentication methods and cloud providers.
🛡️ Security Standards
CIS Kubernetes Benchmark
Implements key security controls from the Center for Internet Security:
- CIS-5.1.1: Cluster-admin role usage
- CIS-5.1.2: Privileged container admission
- CIS-5.1.3: Privilege escalation prevention
- CIS-5.1.4: Capabilities management
- CIS-5.1.5: Host network restrictions
- CIS-5.1.6: Host PID restrictions
- CIS-5.1.7: Host IPC restrictions
- CIS-5.1.8: Seccomp profile requirements
- CIS-5.1.9: AppArmor profile requirements
- CIS-5.1.10: Service account token management
NIST SP 800-190
Follows NIST Application Container Security Guide controls:
- NIST-4.1.1: Image vulnerability management
- NIST-4.2.1: Container runtime security
- NIST-4.3.1: Network segmentation
- NIST-4.4.1: Resource limits and quotas
- NIST-4.5.1: Secret management
- NIST-4.6.1: Access control and RBAC
- NIST-4.7.1: Logging and monitoring
- NIST-4.8.1: Image signing and verification
⚡ Quick Installation
From Source
Using Go Install
🚀 Quick Start Commands
Basic Scan
JSON Output
HTML Report
Namespace Scan
Custom Rules
Specific Standards
🛠️ JSON-Based Rules Customization
K8s Security Scanner uses external JSON files to define security rules, making it easy to customize and maintain without code changes.