Kube-bench is a tool that checks whether Kubernetes is deployed securely by running the checks documented in the CIS Kubernetes Benchmark. Tests are configured with YAML files, making this tool easy to update as test specifications evolve. There are multiple ways to run kube-bench, such as inside a pod with access to the host's PID namespace and necessary directories, or by applying the supplied job.yaml file to run the tests as a job.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Open-source project for detecting security risks in cloud infrastructure accounts with support for AWS, Azure, GCP, OCI, and GitHub.
Multi-cloud OSINT tool for enumerating public resources in AWS, Azure, and Google Cloud.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
S3Scanner scans for misconfigured S3 buckets across S3-compatible APIs, identifying potential security vulnerabilities and data exposure risks.
Automate actions on Security Command Center findings with automated disk snapshots, IAM grant revocation, and more.
An AWS Lambda auditing tool that provides asset visibility and actionable results through statistical analysis and security checks.
Collection of Kubernetes manifests creating pods with elevated privileges for security testing.
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.