ask ada icon

Ask Ada


Gen-AI Based
Cloud Security

Open Source

KubeArmor is a runtime Kubernetes security engine. It uses eBPF and Linux Security Modules(LSM) for fortifying workloads based on Cloud Containers, IoT/Edge, and 5G networks. It enforces policy-based controls.


AccuKnox CNAPP

Powered by KubeArmor Open-Source

  • We created KubeArmor in 2021
  • We scaled from 0 to 750K+ downloads
  • We are major contributors and maintainers of KubeArmor

10+ Industry Adopters

1300+ Github Stars

750K+ Downloads

The first K8s Security Engine to leverage BPF-LSM

AccuKnox provides one of the industry’s most comprehensive and integrated CNAPP solution which brings together multiple disparate security modules.

DevSecOps empowering OpenSource Project: KubeArmor

Discover KubeArmor, the renowned open-source project developed by AccuKnox and donated to CNCF. This cutting-edge runtime security solution has gained widespread recognition and adoption among top Global 1000 companies and Cloud Native Unicorns.

KubeArmor github repo can be accessed

Unleashing Cloud-Native Runtime Security: The KubeArmor Advantage

KubeArmor stands out as a one-of-a-kind cloud-native runtime security enforcement system. With its exceptional capabilities, KubeArmor effectively restricts the behavior of pods, containers, and nodes at the system level, ensuring robust protection.

Harnessing the Power of Linux Security Modules: Unmatched Policy Enforcement

KubeArmor harnesses the strength of Linux security modules such as AppArmor, SELinux, or BPF-LSM to enforce user-specified policies. This advanced technology forms the backbone of KubeArmor's powerful policy enforcement mechanism.

  • Verify TLS-enabled server ports and check TLS parameters against best practices.
  • Ensure certificates are not expired, revoked. Identify self-signed certificates in the chain.
  • Align with compliance frameworks like PCI-DSS, HIPAA, and 5G Security mandates.
  • Operates seamlessly in Kubernetes, containerized, and non-containerized environments.
  • Automate scanning in CI/CD pipelines for early detection of insecure ports, with JSON reporting for easy integration.

KOSHER (KubeArmor OpenSource Help for usERs) Program

Get Open Source incentives now!

Sign up for KOSHER (KubeArmor OpenSource Help for usERs), a latest AccuKnox incentive that provides exclusive adoption benefits and premium support to organizations globally.

Join KOSHER for Free in 2 steps!


Visit KubeArmor Repository

Show your support for KubeArmor open-source project by starring CNCF project Repository.


Open a Pull Request (PR)

Our team will promptly review and validate the details before adding your organization to the Adopter’s list.

KubeArmor OpenSource vs AccuKnox Enterprise

AccuKnox Runtime Security Features Open Source Enterprise
Observability into the workload at granular level
In-line remediation for Zero Day Attacks
Manual apply of Security Policies using CLI
Integration to SIEM for security events and Notification tool
Network security using CNI
Auto-Discovered Behavioural Policies
Recommendation of Hardening Policies based on standard compliance framework – MITRE, NIST, PCI-DSS, CIS
Inventory View of Application
Network Graph View of the Application
Network Microsegmentation in the application
Hardening of the Secrets Managers like Hashicorp Vault, CyberArk Conjur
GitOps based Version Control for Policy Lifecycle Management
Rollback of recently changed Policy governing App Behavior
On-the-fly detection of change in App Behavior through Policies
Multi-Tenant, Multi-Cluster, RBAC for user-management
Comprehensive Dashboard across workloads running in
Managed/Unmanaged Cluster, Containerized environment, VM or Bare Metal
Integration with Registries for Container Image Vuln Scan
Telemetry aggregation (Process executed, File accessed, Network connections made) and Alerts events (Audit, Block)

KubeArmor Book


KubeArmor is a security solution for Kubernetes and cloud-native platforms that helps protect workloads from cloud attacks. One of the key features of KubeArmor is that it provides these hardening policies out-of-the-box, so you don't have to spend time researching and configuring them yourself. This book provides comprehensive information about open-source cloud security implementation to catalyze your journey to Zero Trust.


Don’t just take our word for it...

The immense performance efficiencies of Kubernetes can be nullified if they are not hardened appropriately. Kubernetes Hardening Guide from NSA discusses it in good detail. MITRE container security also advocates the security best practices from the attacker's perspective. KubeArmor is the best example of how to achieve NIST & MITRE conformance out-of-the-box. The authors have done a great job of explaining key concepts from the basics, I highly recommend it to Kubernetes practitioners.”

Scott Surovich, Principal Engineer, Tier 1 Global Bank, Co-Author of Kubernetes: An Enterprise Guide and Anthos in Action

Kubernetes is the de facto Cloud Operating System, yet securing it efficiently and effectively presents a wide-ranging challenge. KubeArmor's use of eBPF for runtime security positions it amongst the next generation of security-enhancing technologies, and this book outlines key concepts in an easily comprehensible format suitable for a wide range of practitioners."

Andrew Martin, CEO, Control Plane

Effective security controls are precise, tailored and targeted.  KubeArmor’s approach of leveraging eBPF for kernel telemetry and LSMs for inline remediation provides the deep and precise control needed to thwart advanced zero day attacks. The authors have done an excellent job of explaining key concepts for this new and powerful system.”

Dr Michael Collins (PhD - Carnegie Mellon University), Author of Network Security Through Data Analysis

KubeArmor achieving tremendous downloads and 1,200+ GitHub stars is a remarkable testimony to how well it is being received by the CNCF community. KubeArmor belongs in every K8 engineer’s open-source tool chest, and consequently, this book is a 'must-read' for every Cloud Native engineer."

Kandan Kathirvel, TSC-Chair, Nephio [Linux Foundation project]

Kubernetes has now fully emerged as the de facto Cloud Operating System. Just like in any OS, it is now important to harden and protect it. Linux Security Modules (LSMs) have been used for decades to provide very strong, fundamental proven security. Leveraging these primitives to provide an "armor" to Kubernetes is a natural progression and KubeArmor has achieved this very well. This book is a superb overview that all Cloud Security personnel will benefit from!"

Dr Suchakra Sharma, Chief Scientist, Privado

KubeArmor's pioneering use of eBPF for kernel telemetry and LSMs for direct remediation redefines strategies to combat advanced zero-day threats, achieving a significant recognition in the CNCF community, as reflected by its remarkable download numbers and GitHub stars. This publication explores why KubeArmor's  is deemed critical for every Cloud Native engineer, acclaimed for its straightforward explanation of intricate security principles. It rectifies and hardens  Kubernetes vulnerabilities by enhancing performance and complying with Zero Trust security guidelines. The book demystifies advanced security techniques for a wide audience, from beginners to experts, and its highly recommended for everyone involved in Kubernetes deployment and hardening it as per NIST and MITRE security standards.”

Bala Kannan, Senior CyberSecurity Architect for Cloud, Containers and AI/ML, Pure Storage


KubeArmor supports Workloads deployed as k8s orchestrated containers and VM/Bare-Metals workloads

For Kubernetes, the deployment is a demon set.

With edge computing shifting towards containerized workloads and in a few cases to orchestrated kubernetes workloads, it becomes important to have a security solution.

KubeArmor not only provides enforcement into different forms of deployment but can also provide real-time container-rich observability.

KubeArmor supporting un-orchestrated containers, k8s workloads and bare metal VMs makes it an ideal universal engine. Its kernel-level runtime security enforcement and container-aware observability bring the best of both worlds.

You cannot secure what you cannot see.

Your most sensitive information is stored on cloud and on premise infrastructure. Protect what is most important from cyber attacks. Real-time autonomous protection for your network's edges.

Ready to get started?