Skip to content

Commit d127165

Browse files
committed
docs: Update index page with project status notice and expanded focus
Signed-off-by: Aaron Lippold <[email protected]>
1 parent 4ae96c8 commit d127165

File tree

1 file changed

+20
-12
lines changed

1 file changed

+20
-12
lines changed

docs/index.md

+20-12
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,9 @@
1-
# Secure CINC Auditor Kubernetes Container Scanning
1+
# Kube Secure Scanner
22

3-
A comprehensive platform for securely scanning Kubernetes containers, including distroless containers, using CINC Auditor with least-privilege security controls.
3+
A flexible, security-focused framework for scanning containers in Kubernetes environments with multiple scanning engines. Initially built with CINC Auditor (open source InSpec), the platform provides secure RBAC configurations, multiple scanning approaches, and comprehensive CI/CD integration.
4+
5+
!!! info "Release Preview v0.90"
6+
This is an ongoing joint community research effort and is currently at **Release Preview (v0.90)**. Some examples, automation, pipelines, and scripts are still in the process of being fully tested and validated. We'll be releasing updates in v0.9.x versions as we work toward a stable v1.0.0 release.
47

58
*[CINC]: CINC Is Not Chef
69
*[SAF]: Security Automation Framework
@@ -60,15 +63,16 @@ A comprehensive platform for securely scanning Kubernetes containers, including
6063

6164
## Scanning Approaches
6265

63-
This project offers three distinct approaches for container scanning:
66+
This project offers three distinct approaches for container scanning, designed to accommodate various container types and Kubernetes environments:
6467

6568
=== "Kubernetes API Approach (Recommended)"
6669

67-
Direct API-based scanning using the train-k8s-container plugin. Most scalable solution with seamless integration.
70+
Direct API-based scanning approach. Most scalable solution with seamless integration.
6871

6972
- Works with standard containers now
7073
- Universal solution once distroless support is complete
7174
- No configuration changes to existing pods
75+
- Flexible scanner engine support (roadmap)
7276

7377
[Learn More](approaches/kubernetes-api/index.md){: .md-button }
7478

@@ -79,16 +83,18 @@ This project offers three distinct approaches for container scanning:
7983
- Requires Kubernetes 1.16+ with ephemeral containers
8084
- Works with existing deployed containers
8185
- Good for testing environments
86+
- Compatible with multiple scanner engines
8287

8388
[Learn More](approaches/debug-container/index.md){: .md-button }
8489

8590
=== "Sidecar Container Approach"
8691

87-
CINC Auditor sidecar container with shared process namespace for any container type.
92+
Scanner sidecar container with shared process namespace for any container type.
8893

8994
- Works with any Kubernetes cluster
9095
- Universal compatibility
9196
- Must be deployed alongside target container
97+
- Supports pluggable scanner engines
9298

9399
[Learn More](approaches/sidecar-container/index.md){: .md-button }
94100

@@ -122,7 +128,7 @@ The fastest way to get started is with our Quick Start guide:
122128

123129
## Project Roadmap
124130

125-
Our active roadmap includes the following key initiatives:
131+
Our active roadmap includes the following key initiatives for the path to v1.0:
126132

127133
<div class="grid cards" markdown>
128134

@@ -142,18 +148,20 @@ Our active roadmap includes the following key initiatives:
142148

143149
Expand scanning capabilities to new container types.
144150

145-
- Extend train-k8s-container plugin for distroless support
151+
- Complete API-based direct scanning approach
146152
- Improve scan performance for specialized containers
153+
- Add universal distroless container support
147154

148-
- :material-tools:{ .lg .middle } **Additional Security Tool Integration**
155+
- :material-tools:{ .lg .middle } **Multi-Scanner Engine Architecture**
149156

150157
---
151158

152-
Expand beyond CINC to integrate additional security scanning tools.
159+
Implement framework for integrating multiple scanning engines:
153160

154-
- Anchore Grype integration for vulnerability scanning
155-
- Anchore Syft integration for SBOM generation
156-
- Evaluate additional security tools for inclusion
161+
- Scanner engine plugin interface
162+
- Results normalization layer
163+
- Support for vulnerability scanners and SBOM generators
164+
- Scanner configuration standardization
157165

158166
## Core Documentation
159167

0 commit comments

Comments
 (0)