merry1314 / cloud-native-security-inspector

This project scans and assesses workloads in Kubernetes at runtime. It can apply protection rules to workloads to avoid further risks as well.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Cloud Native Security Inspector (Project Narrows)

CodeQL Cypress

Cloud Native Security Inspector is an open source cloud native runtime security tool. It allows end users to assess the security posture of Kubernetes clusters at runtime. This project will add dynamic scanning giving Security Auditors greater awareness and control of running workloads.

Features

  • View overall security posture of applications in runtime
  • Policy-based scanning management
  • Revise baseline policies as needed and prevent redeploying workloads sourced from vulnerable images
  • Quarantine non-secure workloads
  • Review and filter the assessment reports
  • Send the historical assessment reports to OpenSearch or ElasticSearch

Architecture

Cloud Native Security Inspector consists of the following 3 components:

  1. The Controller Manager
  2. The Portal
  3. Scanners

In regard to scanners, currently we support 3 different kinds of scanners:

Harbor provides static analysis of vulnerabilities in images through the open source projects Trivy. In CNSI, this capability is used to perform dynamic security application testing (DAST).

Kubebench scanner mainly cares about the underlying Kubernetes cluster. It checks whether Kubernetes is deployed securely by running the checks documented in the CIS Kubernetes Benchmark.

The Risk scanner fetches the CVSS vectors from the image vulnerability report, then reports scored-risks it observed in the vector.

Demo

Video Demo - Demo for Cloud Native Security Inspector features

Prerequisites

Deployment & Run

Follow the instructions below to deploy the Cloud Native Security Inspector. There are two deployment options:

  • Using pre-built images
  • Building images from scratch

Option 1: Using pre-built images (recommended)

Using the following command to clone the source code:

$ git clone https://github.com/vmware-tanzu/cloud-native-security-inspector.git

Use the following commands to deploy the Cloud Native Security Inspector and other related components, and make sure the Kubernetes cluster has an Internet connection.

$ cd cloud-native-security-inspector

$ ./deploy.sh install

Option 2: Building images from scratch

Instead of using the pre-built images, users can also choose to build the images from source. Optionally, after the images are built, they can be pushed to a registry service. (either Harbor or DockerHub). Use the following command to clone the source code:

$ git clone https://github.com/vmware/cloud-native-security-inspector.git

Before building the images, please ensure you have installed and configured the golang SDK correctly. To install the golang SDK, please familiarize yourself with the Golang documentation.

Use the following commands to compile the source code and build the docker images. After that, the images are generated and pushed to registry, then deployed.

$ cd cloud-native-security-inspector
$ ./deploy.sh install --build-source

Verifying the deployment

After the installation is completed either via Option 1 or Option 2, use the following command to see if all the components have been started successfully in Kubernetes.

# Verify the manager and portal
kubectl get deployment -n cnsi-system
NAME                                     READY   UP-TO-DATE   AVAILABLE   AGE
cloud-native-security-inspector-portal   1/1     1            1           93m
cnsi-controller-manager                  1/1     1            1           93m

# Verify other resource of portal deployment
$ kubectl get serviceaccount -n cnsi-system cloud-native-security-inspector-portal-serviceaccount
NAME                                                    SECRETS   AGE
cloud-native-security-inspector-portal-serviceaccount   0         166m

$ kubectl get clusterRole -n cnsi-system cloud-native-security-inspector-portal-role
NAME                                          CREATED AT
cloud-native-security-inspector-portal-role   2022-08-10T06:33:01Z

$ kubectl get clusterrolebinding -n cnsi-system cloud-native-security-inspector-portal-rolebinding
NAME                                                 ROLE                                                      AGE
cloud-native-security-inspector-portal-rolebinding   ClusterRole/cloud-native-security-inspector-portal-role   130m

$ kubectl get svc -n cnsi-system cloud-native-security-inspector-portal-service
NAME                                             TYPE       CLUSTER-IP     EXTERNAL-IP   PORT(S)          AGE
cloud-native-security-inspector-portal-service   NodePort   10.98.232.35   <none>        3800:32541/TCP   44h

Run

  • Refer to the Tutorial for a quick guidance.
  • Refer to the User Guide for more details on how to use Cloud Native Security Inspector.

Uninstalling

To uninstall Cloud Native Security Inspector, use the following command:

$ ./deploy.sh uninstall 

For more details, please refer to the User Guide.

Contact us

Email: narrows@vmware.com

License

Cloud Native Security Inspector is available under the Apache 2 license.

About

This project scans and assesses workloads in Kubernetes at runtime. It can apply protection rules to workloads to avoid further risks as well.

License:Apache License 2.0


Languages

Language:Go 33.4%Language:TypeScript 29.7%Language:HTML 15.4%Language:JavaScript 9.2%Language:CSS 5.6%Language:Less 4.6%Language:Makefile 1.0%Language:Shell 0.9%Language:Dockerfile 0.1%