首页 > 其他分享 >8 Kubernetes Scanner to find Security Vulnerability and Misconfiguration

8 Kubernetes Scanner to find Security Vulnerability and Misconfiguration

时间:2023-05-18 16:56:42浏览次数:104  
标签:Misconfiguration Scanner Kubernetes tool cluster security Kube risk

https://geekflare.com/kubernetes-security-scanner/

You are using Kubernetes. Great! How about its security?

We all know that Kubernetes has become one of the best container orchestration platforms today. More than 80% of organizations today are leveraging Kubernetes in one way or another. It simply automates provisioning configurations and management of the containers.

But apart from the simplicity, security also has one of the most crucial parts of any containerized application. You must be aware of how to provide robust security to the applications running on the Kubernetes cluster. The security issues have increased exponentially in the last few years, so this domain’s focus is on every organization.

If you know the basics of Kubernetes, then you would know, Kubernetes by default, assigns an IP address to every port in the clusters and provides IP-based security. But Kubernetes provides only the basic security measures. Unfortunately, when you talk about the advanced security monitoring and compliance enforcement of admins, Kubernetes doesn’t provide that security level. But fortunately, many third-party open-source Kubernetes scanners can help you secure your Kubernetes clusters.

Here are a few benefits of using Kubernetes Scanners:

  • Identifies the misconfigurations and vulnerabilities in the cluster, containers, pods
  • Provides solutions to correct the misconfigurations and remove the vulnerabilities
  • It gives a real-time view of the cluster health.
  • Gives more confidence to the DevOps team to develop and deploy the applications on a Kubernetes cluster
  • It helps to avoid cluster failure by identifying the issue in the early stage.

Let’s explore the following tools to help you find security vulnerability and misconfiguration to provide security to your containerized applications.

Kube Hunter

Kube Hunter is a vulnerability scanning tool by Aqua Security for your Kubernetes cluster. This tool is very useful in increasing the security awareness for Kubernetes clusters. This tool offers multiple standard scanning options such as remote, interlace, network to identify the vulnerabilities.

It has a list of active and passive tests that can identify most vulnerabilities present in a Kubernetes cluster.

kube hunter - geekflare

There are a few different ways that you can run this tool.

  • You can download the binary zip file, extract it, or use pip to directly install Kube Hunter on a machine with network access to the Kubernetes cluster. After the installation, you can start scanning your cluster for vulnerabilities.
  • The second method of using Kube Hunter is as a docker container. You can directly install Kube Hunter on a machine in the cluster and then probe the local networks to scan the clusters.
  • And the third way is to run Kube Hunter as a pod inside your Kubernetes cluster. This helps you find vulnerabilities in any application pods.

Kube Bench

Kube Bench is one of the open-source quality security tools that check if your deployments meet the CIS’s security benchmark (Center for Internet Security).

It supports the benchmark tests for multiple versions of Kubernetes. Apart from that, it also points out the errors and helps in fixing them. It provides the solution to fix the errors. This tool also checks to ensure that user authorization and authentication are proper, the data is securely encrypted. It ensures that deployment allowed up allows the CIS principal.

kube bench

Kube Bench features:

  • Written as Go application
  • Test for Kubernetes masters and nodes
  • Available as a container
  • Tests are defined in YAML, easier to extend and update
  • Supports JSON-format output

Checkov

Checkov is a security tool used to prevent cloud misconfigurations during build time for Kubernetes, Terraform, Cloudformation, Serverless framework, and other infrastructure-as-code-languages. It is written in Python and aims to increase security adoption and best practices compliance.

You can run scans using Checkov to analyze the infrastructure as code.

checkov

Checkov features:

  • Open-source and straightforward to use
  • More than 500 built-in security policies
  • Compliance best practices for AWS, Azure & Google Cloud
  • Supports multiple output format – CLI, JUnit XML, JSON
  • Integrate scans to your ci/cd pipelines
  • Runs scan for input folder that contains your Terraform & Cloudformation files

MKIT

MKIT stands for Managed Kubernetes Inspection Tool. This tool helps you quickly identify key security risks for Kubernetes clusters and their resources. It has quick and easy ways to assess the misconfigurations in the cluster and the workloads.

The tool comes with an interface that runs on http://localhost:8000 by default. It gives you a view of failed checks and passed checks. In the affected resources section, you will get the details of affected and non-affected resources.

mkit

MKIT features:

  • Built using all open-source libraries and tools
  • Easy to install and use
  • Supports multiple Kubernetes providers – AKS, EKS, and GKE
  • Stores sensitive data inside the container
  • Provides a web interface

Kubei

Kubei is used to assess the immediate risks in a Kubernetes cluster. The majority part of Kubei is written in the Go programming language. It covers all the CIS Docker benchmarks.

It scans all the images used by the Kubernetes cluster, application pods, system pods, etc. You get multiple options to customize the scan in terms of vulnerability level of interest, speed of the scan, scope of the scan, etc. With the GUI it provides, you get to view all the vulnerabilities it finds in the cluster and how to mitigate them.

kubei

Kubei features:

  • Open-Source Kubernetes Runtime Vulnerability Scanner
  • Scans public images hosted in your registry
  • Provides Real-time status of the cluster health
  • Web User Interface for visualization of scans
  • Provides multiple custom options for scan

Kube Scan

Kube Scan is a container scanner that comes as a container itself. You install it in a new cluster, after which it scans the workloads that are currently running in your cluster and shows you the risk score and the risk details in the friendly web UI. The risk score is rated from 0 to 10, 0 means no risk, and 10 means high risk.

kubescan

The formula used and scoring rules used by Kube scan is based on KCCSS, the Kubernetes Common Configuration Scoring System, which is an open-source framework. It is similar to CVSS (Common Vulnerability Scoring System). It uses more than 30 security settings like Kubernetes policies, capabilities, privilege levels and creates a risk baseline to provide a risk score. The risk score is also based on the ease of exploitation or the high impact and scope of exploitation.

Kube Scan features:

  • Open-source risk assessment scoring tool
  • Web UI with risk assessment and risk score details
  • It runs as a container in the cluster.
  • Rescans the cluster every 24 hours

Kubeaudit

Kubeaudit, as the name, suggests is an open-source Kubernetes cluster auditing tool. It finds the security misconfigurations in the Kubernetes resources and tell you how to resolve them. It is written in the Go language to use it as a Go package or a command-line tool. You can install it on your machine using brew with a single command.

It suggests various practices such as running applications as a no root user, giving read-only access to the root filesystem, avoid giving more privileges to applications in the cluster to prevent common security concerns. It has an extensive list of auditors used to test the Kubernetes cluster’s security concerns, such as SecurityContext of pods.

kubeaudit

Kubeaudit features:

  • Open-source Kubernetes auditing tool
  • Provides three different modes – manifest, local, cluster, to audit the cluster
  • Gives the audit result at three levels of severity – Error, Warn, Info
  • Uses several in-built auditors for auditing containers, pods, namespaces

Kubesec

Kubesec is an open-source Security risk analysis tool for Kubernetes resources. It validates the configuration and the manifest files used for Kubernetes cluster deployment and operations. You can install it on your system using its container image, its binary package, an admission controller in Kubernetes, or a kubectl plugin.

kubesec

Kubesec features:

  • An open-source risk analysis tool
  • It comes with a bundled HTTP server that runs in the background at 8080 by default.
  • Run Kubesec-as-a-Service via HTTPS at v2.kubesec.io/scan
  • It can scan multiple YAML documents in a single input file.

Conclusion

These tools aim to keep the Kubernetes cluster and its resources secure and make it difficult for hackers to break into the applications running inside the cluster. The scanners will help you deploy the applications on the cluster more confidently. So, go ahead and try out these tools and identify the vulnerabilities in them before a hacker does.

标签:Misconfiguration,Scanner,Kubernetes,tool,cluster,security,Kube,risk
From: https://www.cnblogs.com/dhcn/p/17412453.html

相关文章

  • 微服务注册中心之Zookeeper,Eureka,Nacos,Consul,Kubernetes区别
    目录1微服务注册中心1.1注册中心概念1.1.1为什么需要注册中心1.1.2如何实现一个注册中心1.1.3如何解决负载均衡的问题1.2注册中心如何选型1.2.1Zookeeper1.2.2Eureka1.2.3Nacos1.2.4Consul1.2.5Kubernetes1微服务注册中心微服务的注册中心目前主流的有以下五种:Zooke......
  • 使用nfs作为kubernetes动态storageClass存储
    使用nfs作为kubernetes动态storageClass存储1、StorageClass介绍参考网址:https://github.com/kubernetes-retired/external-storage​https://blog.51cto.com/xuexinhuan/5394844StorageClass对象会定义下面两部分内容:1:PV的属性.比如,存储类型,Vo......
  • 关于Kubernetes-v1.23.6-网络组件-calico的安装部署...
    当2个workernodes节点加入到 Kubernetes/k8s集群后,我们去master节点、执行kubectlgetnodes命令就可以看到worker节点了但是我们会看到无论是master节点、还是worker节点,STATUS都会是  NotReady,如下[root@k8s-masterqq-5201351]#kubectlgetnodesNAME......
  • kubeadm是官方社区推出的一个用于快速部署kubernetes集群的工具
    kubeadm是官方社区推出的一个用于快速部署kubernetes集群的工具。这个工具能通过两条指令完成一个kubernetes集群的部署:# 创建一个 Master 节点$kubeadminit​# 将一个 Node 节点加入到当前集群中$kubeadmjoin<Master节点的IP和端口 >1. 安装要求在开始之前,部署Kuber......
  • VMware Tanzu Kubernetes Grid Integrated Edition (TKGI) 1.16 - 运营商 Kubernetes
    VMwareTanzuKubernetesGridIntegratedEdition(TKGI)1.16-运营商Kubernetes解决方案请访问原文链接:https://sysin.org/blog/vmware-tkgi/,查看最新版。原创作品,转载请保留出处。作者主页:sysin.orgVMwareTanzuKubernetesGridIntegratedEdition(TKGI)使运营商能......
  • VMware Tanzu Kubernetes Grid (TKG) 2.1 - 企业级 Kubernetes 解决方案
    VMwareTanzuKubernetesGrid(TKG)2.1-企业级Kubernetes解决方案VMware构建、签名和支持的开源Kubernetes容器编排平台的完整分发版请访问原文链接:https://sysin.org/blog/vmware-tkg-2/,查看最新版。原创作品,转载请保留出处。作者主页:sysin.orgTanzuKubernetes集......
  • Kubernetes故障排除要领
    要在最短的停机时间内运行应用程序,需要完善故障排除技能,将应用程序扩展到运行它们的Kubernetes集群。定期对整个Kubernetes集群进行调试和故障排除,以提供一致的支持和服务,这一点至关重要。故障排除包括识别、诊断和解决Kubernetes集群、节点、pod、容器和其他资源中的问题。由于Kub......
  • Scanner进阶使用
    1. (if的使用会在后续学习)其他类型像int,float型等就把相应的都变成nextInt()/hasNextInt()  nextFloat()/hasNextFloat()(Scanner其实就是和键盘相关联,可以输入一些东西,然后运行。)......
  • Scanner对象
    1.Scanner对象用Scanner类来获取用户的输入:Scanners=newScanner(System.in);通过Scanner类的next()与nextLine()方法获取输入的字符串,再读取之前我们一般需要使用hasNext()与hasNextLine()判断是否还有输入的数据。输入helloworld,结果显示hello       输入hellow......
  • 云原生第三周--kubernetes组件详解
    etcd组件etcd简介:etcd是CoreOS团队于2013年6月发起的开源项目,它的目标是构建一个高可用的分布式键值(key-value)数据库。etcd内部采用raft协议作为一致性算法,etcd基于Go语言实现。etcd具有下面这些属性:完全复制:集群中的每个节点都可以使用完整的存档高可用性:Etcd可用于避免......