Kubescape — Kubernetes Security Platform from CNCF
Kubescape scans Kubernetes clusters, YAML manifests, and Helm charts against NSA, CIS, and MITRE frameworks. Built by ARMO and a CNCF Sandbox project, it catches misconfigurations and vulnerabilities before they reach production.
What it is
Kubescape is a Kubernetes security platform that scans clusters, YAML manifests, and Helm charts against established security frameworks including NSA-CISA, CIS Benchmarks, and MITRE ATT&CK. It identifies misconfigurations, excessive permissions, missing network policies, and container vulnerabilities. Kubescape is a CNCF Sandbox project built by ARMO.
Kubescape targets DevOps engineers, security teams, and anyone responsible for Kubernetes cluster security. It catches security issues before they reach production by scanning both live clusters and local manifests during development.
How it saves time or tokens
Kubescape runs comprehensive security checks in a single command. Instead of manually reviewing each deployment against security benchmarks, Kubescape automates the entire audit. It scores your cluster against frameworks, highlights specific failed controls, and provides remediation guidance. CI/CD integration catches security regressions automatically on every commit.
How to use
- Install Kubescape:
curl -s https://raw.githubusercontent.com/kubescape/kubescape/master/install.sh | bash. - Scan a running cluster:
kubescape scan --enable-host-scan --verbose. - Scan local manifests:
kubescape scan *.yamlor scan Helm charts before deployment.
Example
# Install
curl -s https://raw.githubusercontent.com/kubescape/kubescape/master/install.sh | bash
# Scan running cluster
kubescape scan --enable-host-scan --verbose
# Scan local manifests
kubescape scan deployment.yaml service.yaml
# Scan against specific framework
kubescape scan framework nsa --exclude-namespaces kube-system
# Scan Helm chart
kubescape scan helm-chart ./my-chart
# CI/CD mode with exit code
kubescape scan --fail-threshold 50
Related on TokRepo
- Security Tools — Security scanning and audit tools
- DevOps Tools — Kubernetes operations tools
Common pitfalls
- Not all failed controls require immediate action. Some security recommendations (like restricting root containers) may conflict with legitimate workload requirements. Prioritize based on risk.
- Host scanning (
--enable-host-scan) requires access to cluster nodes. In managed Kubernetes (GKE, EKS), you may not have node-level access for all checks. - Kubescape scans are point-in-time. For continuous security monitoring, integrate Kubescape into your CI/CD pipeline and use the ARMO platform for runtime monitoring.
Frequently Asked Questions
Kubescape supports NSA-CISA Kubernetes Hardening Guide, CIS Kubernetes Benchmarks, MITRE ATT&CK for Containers, and custom frameworks. You can also create your own framework with specific controls.
Yes. Kubescape scans YAML manifests and Helm charts locally without a running cluster. This shift-left approach catches misconfigurations during development and in CI/CD pipelines.
Kubescape identifies issues and provides remediation guidance but does not automatically modify your manifests. You apply fixes based on the recommendations. Some controls include suggested YAML patches.
Run kubescape scan in your CI pipeline with --fail-threshold to fail builds when the security score drops below a threshold. Kubescape outputs JSON for integration with other tools and dashboards.
Yes. The CLI and open-source scanning engine are free. ARMO offers a commercial platform with continuous monitoring, multi-cluster management, and team collaboration features.
Citations (3)
- Kubescape GitHub— Kubescape scans Kubernetes against NSA, CIS, and MITRE frameworks
- Kubescape Documentation— CNCF Sandbox project for Kubernetes security
- NSA Cybersecurity— NSA-CISA Kubernetes Hardening Guide
Related on TokRepo
Discussion
Related Assets
NAPI-RS — Build Node.js Native Addons in Rust
Write high-performance Node.js native modules in Rust with automatic TypeScript type generation and cross-platform prebuilt binaries.
Mamba — Fast Cross-Platform Package Manager
A drop-in conda replacement written in C++ that resolves environments in seconds instead of minutes.
Plasmo — The Browser Extension Framework
Build, test, and publish browser extensions for Chrome, Firefox, and Edge using React or Vue with hot-reload and automatic manifest generation.