Kubescape logo

Kubescape

Unified Kubernetes security from development to runtime

Kubescape secures Kubernetes clusters, YAML, and Helm charts against NSA‑CISA, MITRE ATT&CK, and CIS benchmarks, with CLI, operator, and CI/CD integrations.

Kubescape banner

Overview

Overview

Kubescape is a comprehensive security platform for Kubernetes environments, targeting administrators, DevOps engineers, and security teams. It provides hardening, posture management, and runtime protection across the entire lifecycle, from code and configuration to live workloads.

Capabilities & Deployment

The tool scans clusters, YAML manifests, and Helm charts using multiple compliance frameworks. It leverages Open Policy Agent for policy enforcement, Grype for image vulnerability detection, and Inspektor Gadget for eBPF‑based runtime analysis. Users can run quick scans via the CLI, deploy continuous monitoring with the in‑cluster operator (installed through a Helm chart), or embed security checks into CI/CD pipelines using the official GitHub Action. Results are exportable in JSON, JUnit XML, SARIF, HTML, or PDF, and can be sent to a cloud service for centralized reporting.

Highlights

Multi‑framework misconfiguration scanning (NSA‑CISA, MITRE ATT&CK, CIS)
In‑cluster operator with continuous scanning, image vulnerability, runtime analysis, and network policy generation
CLI and GitHub Action for fast, on‑demand assessments
Export reports to JSON, JUnit XML, SARIF, HTML, PDF, or cloud

Pros

  • Broad coverage across development, CI/CD, and runtime
  • Leverages proven tools like OPA, Grype, and Inspektor Gadget
  • Extensible via Helm chart and GitHub Action
  • Active CNCF incubating project with vibrant community

Considerations

  • Requires cluster access for in‑cluster operator
  • Learning curve for customizing policies
  • Report formats may need post‑processing for some pipelines
  • Limited native remediation automation

Managed products teams compare with

When teams consider Kubescape, these hosted platforms usually appear on the same shortlist.

Anchore logo

Anchore

Container security and compliance platform for scanning container images and software supply chains

Aqua Security logo

Aqua Security

Cloud-native security platform focusing on container and Kubernetes protection from development to runtime

Sysdig logo

Sysdig

Cloud-native security and monitoring

Looking for a hosted option? These are the services engineering teams benchmark against before choosing open source.

Fit guide

Great for

  • Kubernetes administrators seeking continuous security posture monitoring
  • DevOps teams integrating security into CI/CD pipelines
  • Security engineers needing compliance checks against multiple frameworks
  • Organizations adopting CNCF‑aligned tools

Not ideal when

  • Small, single‑node clusters without compliance requirements
  • Teams preferring fully managed SaaS security solutions
  • Environments lacking Helm or OPA familiarity
  • Projects that need out‑of‑the‑box remediation without custom scripting

How teams use it

Pre‑deployment compliance scan

Detects misconfigurations in Helm charts and YAML before they reach production, ensuring alignment with NSA‑CISA and CIS benchmarks.

Continuous in‑cluster monitoring

Operator continuously scans running workloads, flags drift, and generates network policies to enforce least‑privilege connectivity.

CI/CD pipeline security gate

GitHub Action aborts merges when new images contain known vulnerabilities or policy violations, automating risk mitigation.

Incident response runtime analysis

eBPF‑based inspection reveals suspicious process activity, aiding rapid investigation of potential attacks.

Tech snapshot

Go99%
Python1%
Shell1%
PowerShell1%
Dockerfile1%
Makefile1%

Tags

kubernetesnsavulnerability-detectionmitre-attackdevopsbest-practicesecurity

Frequently asked questions

Do I need a paid subscription to use Kubescape?

No, Kubescape is fully free under the Apache‑2.0 license; optional cloud services are separate.

Which Kubernetes versions are supported?

Kubescape supports all actively maintained Kubernetes versions; the CLI works with any cluster reachable via kubectl.

Can I extend the policy library?

Yes, you can add custom Rego policies to the OPA engine or contribute to the upstream control set.

How does Kubescape scan container images?

It uses the Grype vulnerability scanner to analyze image layers for CVEs and known exploits.

Is there a way to suppress false positives?

Kubescape supports risk exceptions, allowing you to whitelist specific findings per cluster or workload.

Project at a glance

Active
Stars
11,147
Watchers
11,147
Forks
893
LicenseApache-2.0
Repo age4 years old
Last commityesterday
Primary languageGo

Last synced 3 hours ago