ScriptsApr 14, 2026·3 min read

Kubescape — Kubernetes Security Platform from CNCF

Kubescape scans Kubernetes clusters, YAML manifests, and Helm charts against NSA, CIS, and MITRE frameworks. Built by ARMO and a CNCF Sandbox project, it catches misconfigurations and vulnerabilities before they reach production.

TL;DR
Kubescape scans Kubernetes clusters, manifests, and Helm charts against NSA, CIS, and MITRE security frameworks to catch misconfigurations and vulnerabilities.
§01

What it is

Kubescape is a Kubernetes security platform that scans clusters, YAML manifests, and Helm charts against established security frameworks including NSA-CISA, CIS Benchmarks, and MITRE ATT&CK. It identifies misconfigurations, excessive permissions, missing network policies, and container vulnerabilities. Kubescape is a CNCF Sandbox project built by ARMO.

Kubescape targets DevOps engineers, security teams, and anyone responsible for Kubernetes cluster security. It catches security issues before they reach production by scanning both live clusters and local manifests during development.

§02

How it saves time or tokens

Kubescape runs comprehensive security checks in a single command. Instead of manually reviewing each deployment against security benchmarks, Kubescape automates the entire audit. It scores your cluster against frameworks, highlights specific failed controls, and provides remediation guidance. CI/CD integration catches security regressions automatically on every commit.

§03

How to use

  1. Install Kubescape: curl -s https://raw.githubusercontent.com/kubescape/kubescape/master/install.sh | bash.
  2. Scan a running cluster: kubescape scan --enable-host-scan --verbose.
  3. Scan local manifests: kubescape scan *.yaml or scan Helm charts before deployment.
§04

Example

# Install
curl -s https://raw.githubusercontent.com/kubescape/kubescape/master/install.sh | bash

# Scan running cluster
kubescape scan --enable-host-scan --verbose

# Scan local manifests
kubescape scan deployment.yaml service.yaml

# Scan against specific framework
kubescape scan framework nsa --exclude-namespaces kube-system

# Scan Helm chart
kubescape scan helm-chart ./my-chart

# CI/CD mode with exit code
kubescape scan --fail-threshold 50
§05

Related on TokRepo

§06

Common pitfalls

  • Not all failed controls require immediate action. Some security recommendations (like restricting root containers) may conflict with legitimate workload requirements. Prioritize based on risk.
  • Host scanning (--enable-host-scan) requires access to cluster nodes. In managed Kubernetes (GKE, EKS), you may not have node-level access for all checks.
  • Kubescape scans are point-in-time. For continuous security monitoring, integrate Kubescape into your CI/CD pipeline and use the ARMO platform for runtime monitoring.

Frequently Asked Questions

What security frameworks does Kubescape support?+

Kubescape supports NSA-CISA Kubernetes Hardening Guide, CIS Kubernetes Benchmarks, MITRE ATT&CK for Containers, and custom frameworks. You can also create your own framework with specific controls.

Can Kubescape scan before deployment?+

Yes. Kubescape scans YAML manifests and Helm charts locally without a running cluster. This shift-left approach catches misconfigurations during development and in CI/CD pipelines.

Does Kubescape fix issues automatically?+

Kubescape identifies issues and provides remediation guidance but does not automatically modify your manifests. You apply fixes based on the recommendations. Some controls include suggested YAML patches.

How does Kubescape integrate with CI/CD?+

Run kubescape scan in your CI pipeline with --fail-threshold to fail builds when the security score drops below a threshold. Kubescape outputs JSON for integration with other tools and dashboards.

Is Kubescape free?+

Yes. The CLI and open-source scanning engine are free. ARMO offers a commercial platform with continuous monitoring, multi-cluster management, and team collaboration features.

Citations (3)

Discussion

Sign in to join the discussion.
No comments yet. Be the first to share your thoughts.

Related Assets