Key use cases
Understand & visualize the behavior of your workload at runtime to detect 3rd party software issues.
Adopt zero trust principles and generate least privilege security policies that can be applied to enable runtime security and enforcement at the pod and process level.
Protect your Kubernetes and VM workloads from malicious behavior due to supply chain issues, un-patched vulnerabilities and zero day attacks.
Getting Started with Runtime security
Install Open Source ComponentsThis install instructions allow you to setup sample k8s cluster with:
- Cilium CNI
- Kubearmor Application Protection Engine
- Auto Policy Discovery Engine
- Command line tools
Get auto discovered policies for your application
Quickly and easily get auto discovered policies for your application in minutes.
Install Feeder service to collect metrics and logs
The On-Prem Feeder provides the feasibility of pushing the agent logs to Elastic Host using beats and feeder agent. The On-Prem Feeder agent also has the capability of pushing metrics into On Prem Prometheus. Logs are also pushed into Elastic into Kibana on the ELK stack.
Open source tools developer focused tooling
Open source tools developer focused tooling that makes runtime cloud security adoption easy.
Application hardening and runtime protection
Accuknox enforces application policies and hardening using KubeArmor - our own open source product that brings AppArmor and SELinux to K8s / Cloud workloads. Addionally Accuknox builds on top of Cilium to provide full support for identity based network segmentation for K8s and VM workloads.
Automated Zero Trust Policy
Fully automated zero trust policy discovery that discovers application and network policies. This is also pushed into Elastic and Kibana on the ELK stack.