Kubernetes security posture management
editKubernetes security posture management
editOverview
editThe Kubernetes Security Posture Management (KSPM) integration allows you to identify configuration risks in the various components that make up your Kubernetes cluster. It does this by evaluating your Kubernetes clusters against secure configuration guidelines defined by the Center for Internet Security (CIS) and generating findings with step-by-step instructions for remediating potential security risks.
This integration supports Amazon EKS and unmanaged Kubernetes clusters. For setup instructions, refer to Get started with KSPM.
How KSPM works
edit- When you add a KSPM integration, it generates a Kubernetes manifest. When applied to a cluster, the manifest deploys an Elastic Agent as a DaemonSet to ensure all nodes are evaluated.
- Upon deployment, the integration immediately assesses the security posture of your Kubernetes resources. The evaluation process repeats every four hours.
- After each evaluation, the integration sends findings to Elasticsearch. Findings appear on the Cloud Security Posture dashboard and the findings page.
Use cases
editThe KSPM integration helps you to:
-
Identify and remediate
failed
findings - Identify the most misconfigured resources
- Identify risks in particular CIS benchmark sections
Identify and remediate failed findings
editTo identify and remediate failed failed findings:
- Go to the Cloud Security Posture dashboard.
- Click View all failed findings, either for an individual cluster or for all monitored clusters.
- Click a failed finding. The findings flyout opens.
-
Follow the steps under Remediation to correct the misconfiguration.
Remediation steps typically include commands for you to execute. These sometimes contain placeholder values that you must replace before execution.
Identify the most misconfigured Kubernetes resources
editTo identify the Kubernetes resources generating the most failed findings:
- Go to the Findings page.
- Click the Group by menu near the search box and select Resource to view a list of resources sorted by their total number of failed findings.
- Click a resource ID to view the findings associated with that resource.
Identify configuration risks by CIS section
editTo identify risks in particular CIS sections:
- Go to the Cloud Security Posture dashboard.
- In the Failed findings by CIS section widget, click the name of a CIS section to view all failed findings for that section.
Alternatively:
- Go to the Findings page.
-
Filter by the
rule.section
field. For example, search forrule.section : API Server
to view findings for benchmark rules in the API Server category.