Skip to content

Latest commit

 

History

History
135 lines (106 loc) · 4.42 KB

technical_roadmap.md

File metadata and controls

135 lines (106 loc) · 4.42 KB

Technical Roadmap

  • KubeArmor v1.1

    • Kubernetes Environments

      • Self-managed Kubernetes (using kubeadm), MicroK8s, Minikube*
      • Google Kubernetes Engine (GKE), Amazon Elastic Kubernetes Service (EKS)*, Azure Kubernetes Service (AKS)*
    • Container Platforms

      • Docker, Containerd
    • LSM Supports

      • AppArmor, SELinux*
    • Features

      • (KubeArmorPolicy) Add a new field, "apparmor" in KubeArmorPolicy*

        (AppArmor) Apply native AppArmor profiles using KubeArmorPolicy
        
      • (KubeArmorPolicy) Add a new field, "selinux -> volumeMounts" in KubeArmorPolicy*

        (SELinux) Apply SELinux labels and actions to control the access of VolumeMounts using KubeArmorPolicy
        
      • (KubeArmorHostPolicy) Support security policies for hosts*

        Apply security policies to restrict host resources (e.g., processes and files in hosts)
        
      • (Audit Mode) Provide the audit mode if no LSM is enabled in hosts*

        Keep auditing the behavior of containers based on given policies
        In the audit mode, actions are changed as follows:
        - Allow -> Audit (Allow)
        - Audit -> Audit
        - Block -> Audit (Block)
        
      • Monitor container behaviors at the system level

      • Enforce security policies against:

        Process executions
        File accesses
        Network operations
        Capabilities permitted
        
      • Produce container-aware alerts and system logs and write them into:

        Standard output
        Log file
        gRPC
        
      • Provide gRPC clients*

        kubearmor-log-client (https://github.com/kubearmor/kubearmor-log-client)
        kubearmor-mysql-client* (https://github.com/kubearmor/kubearmor-mysql-client)
        kubearmor-kafka-client* (https://github.com/kubearmor/kubearmor-kafka-client)
        
      • Produce telemetry data to monitoring systems*

        Prometheus integration* (https://github.com/kubearmor/kubearmor-prometheus-exporter)
        

    Node that we add a symbol (*) for new features.

  • KubeArmor v1.0

    • Kubernetes Environments

      • Self-managed Kubernetes (using kubeadm), MicroK8s
      • Google Kubernetes Engine (GKE)
    • Container Platforms

      • Docker, Containerd
    • LSM Support

      • AppArmor
    • Features

      • Monitor container behaviors at the system level

      • Enforce security policies against:

        Process executions
        File accesses
        Network operations
        Capabilities permitted
        
      • Produce container-aware alerts and system logs and write them into:

        Standard output
        Log file
        gRPC
        
      • Provide gRPC clients

        kubearmor-log-client (https://github.com/kubearmor/kubearmor-log-client)
        
  • KubeArmor Roadmap for future releases

    • Container Platforms

      • OpenShift, PodMan
    • LSM Supports

      • LSM eBPF (KRSI)
    • Features

      • Automatically generate security policies for given containers against:

        Process executions
        Files accesses
        
      • Enforce security policies (using LSM eBPF) against:

        Process executions
        File accesses
        Network operations
        Capabilities permitted
        
      • Enforce security policies against inter-container communications at the network level

        Integration with network security solutions (e.g., Cilium)
        
      • Advanced in-kernel event auditing system

        Current event auditing systems such as Falco/Tracee provide event-auditing on an individual event basis. They take into account the event context such as process-context, task context etc. With KubeArmor's event auditing system we intend to take this to the next level. KubeArmor's in-kernel event auditing system will allow one to specify rules based on rate-limiting of events, correlation of multiple system events. As an example, consider that the security team is interested only if the number of system call connects happen at more than 10 events per second. Or consider if there are connects happening in parallel with file-read operations where the file is in critical/sensitive path. With KubeArmor's event auditor system, a security team can pinpoint the rule to a greater granularity and thus avoid false positives to a greater extent.