You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Project-wide updates for documentation and organization
- Added comprehensive documentation structure with theme and tools support
- Reorganized workflow examples and improved file organization
- Created extensive documentation infrastructure with MkDocs configuration
- Added WCAG-compliant diagrams and styling
- Implemented proper dark/light mode theme support
- Added CI workflow for documentation deployment
- Improved project organization and file structure
- Expanded documentation for all scanning approaches
Signed-off-by: Aaron Lippold <[email protected]>
Copy file name to clipboardExpand all lines: README.md
+76-14
Original file line number
Diff line number
Diff line change
@@ -6,9 +6,9 @@ This project provides a comprehensive platform for securely scanning Kubernetes
6
6
7
7
Our solution offers three distinct technical approaches for container scanning:
8
8
9
-
1.**Enhanced Transport Approach**: Modified train-k8s-container plugin for direct, API-based scanning through the Kubernetes management node
10
-
2.**Debug Container Approach**: Ephemeral debug container with chroot-based scanning for distroless containers
11
-
3.**Sidecar Container Approach**: CINC Auditor sidecar container with shared process namespace for any container type
9
+
1.**Kubernetes API Approach** (Recommended): Direct API-based scanning through the Kubernetes API using the train-k8s-container plugin. This is our recommended enterprise solution with future distroless support in development, offering the most scalable and seamless integration. Once distroless support is implemented, this will be a universal solution for all container types.
10
+
2.**Debug Container Approach**: Ephemeral debug container with chroot-based scanning for distroless containers, ideal for environments with ephemeral container support.
11
+
3.**Sidecar Container Approach**: CINC Auditor sidecar container with shared process namespace for any container type, offering universal compatibility across Kubernetes versions.
12
12
13
13
These approaches can be deployed via:
14
14
- Self-contained shell scripts for direct management and testing
@@ -42,19 +42,25 @@ Both approaches support:
42
42
43
43
We now provide three distinct approaches for scanning distroless containers:
44
44
45
-
1.**Ephemeral Debug Container** - Uses `kubectl debug` to attach a debug container and scan via chroot. This approach has some limitations:
45
+
1.**Kubernetes API Approach** (Enterprise Recommended) - Enhanced train-k8s-container plugin for direct, API-based scanning:
46
+
-**Implementation**: Currently being developed as our strategic enterprise solution
47
+
-**Advantage**: No additional containers required, most efficient and scalable approach
48
+
-**Advantage**: Seamless integration with existing CINC Auditor/InSpec workflows
49
+
-**Advantage**: Transparent to users - same commands for both standard and distroless containers
50
+
-**Key Advantage**: Will become a universal solution for all container types once distroless support is implemented
51
+
-**Status**: In active development with high priority for enterprise environments
52
+
53
+
2.**Debug Container Approach** - Uses `kubectl debug` to attach a debug container and scan via chroot:
46
54
-**Implementation**: The `scan-distroless-container.sh` script demonstrates this approach
47
55
-**Limitation**: Requires Kubernetes clusters with ephemeral container support enabled
48
-
49
-
2.**Modified Transport Plugin** - Enhanced train-k8s-container plugin for direct, API-based scanning:
50
-
-**Implementation**: Currently a work in progress
51
-
-**Advantage**: No additional containers required, most efficient approach
56
+
-**Use Case**: Best for testing and development environments with ephemeral container support
52
57
53
58
3.**Sidecar Container Approach** - Deploys a scanner sidecar in the same pod with shared process namespace:
54
59
-**Implementation**: Fully implemented in `scan-with-sidecar.sh` and integrated with CI/CD examples
55
60
-**Advantage**: Works with any Kubernetes cluster, requires no special features
56
61
-**Advantage**: Can scan any container type, including distroless containers
57
62
-**Limitation**: Must be deployed alongside the target container (can't scan existing containers)
63
+
-**Use Case**: Ideal for environments without ephemeral container support or for universal compatibility
58
64
59
65
## Directory Structure
60
66
@@ -308,30 +314,86 @@ failed:
308
314
309
315
## Documentation
310
316
311
-
For detailed documentation, see the following guides:
## Secure CINC Auditor Kubernetes Container Scanning v1.0.0
4
+
5
+
We're excited to announce the first stable release of our Secure CINC Auditor Kubernetes Container Scanning platform. This release marks the culmination of extensive development to create a comprehensive, secure, and flexible solution for container compliance scanning in Kubernetes environments.
6
+
7
+
### Key Features
8
+
9
+
-**Three Container Scanning Approaches:**
10
+
- Standard container scanning with train-k8s-container transport
11
+
- Distroless container scanning via ephemeral debug containers
12
+
- Sidecar container scanning with shared process namespace
13
+
14
+
-**Security-Focused Design:**
15
+
- Least privilege RBAC configurations
16
+
- Dynamic, time-limited access tokens
17
+
- Fine-grained label-based access controls
18
+
- Namespace isolation
19
+
20
+
-**Flexible Deployment Options:**
21
+
- Self-contained shell scripts for direct usage
22
+
- Modular Helm charts for enterprise deployment
23
+
- CI/CD integration with GitHub Actions and GitLab CI
24
+
25
+
-**Comprehensive Documentation:**
26
+
- MkDocs-based documentation site with enhanced navigation
27
+
- Executive summary for stakeholders
28
+
- Security risk analysis and mitigations
29
+
- Approach decision matrix for informed selection
30
+
- Enterprise integration analysis
31
+
- Visual workflow diagrams and ASCII text diagrams
32
+
33
+
-**Integration Capabilities:**
34
+
- MITRE SAF CLI for threshold validation
35
+
- GitLab CI integration with services
36
+
- GitHub Actions workflows
37
+
- Comprehensive examples for all approaches
38
+
39
+
### What's Included
40
+
41
+
1.**Shell Scripts:**
42
+
-`setup-minikube.sh` - Set up a test environment with multi-node minikube
43
+
-`scan-container.sh` - Scan standard containers with CINC Auditor
44
+
-`scan-distroless-container.sh` - Scan distroless containers with debug approach
45
+
-`scan-with-sidecar.sh` - Scan containers using the sidecar approach
0 commit comments