Kubernetes Security Onboarding¶
Features Supported for Kubernetes¶
- Supported on managed (EKS, AKS, OCI) and on-prem Kubernetes clusters
- Works on Kubernetes versions >= 1.18
- All features are modular and can be enabled independently
- Available via AccuKnox SaaS and On-Prem Control Plane with identical UX
- Runtime Security requires Linux kernel >= 4.15
- Only egress connectivity from K8s cluster to control plane is required
K8s Runtime Visibility and Security¶
Deployment Mode: DaemonSet via Operator (default) or Kubernetes manifests
Helm Command:
helm upgrade --install agents oci://public.ecr.aws/k9v9d5v2/agents-chart \
--version "v0.10.0" \
--set joinToken="[TOKEN]" \
--set spireHost="spire.demo.accuknox.com" \
--set ppsHost="pps.demo.accuknox.com" \
--set knoxGateway="knox-gw.demo.accuknox.com:3000" \
--set admissionController.enabled=false \
--set kyverno.enabled=false \
-n agents --create-namespace
Features:
- File, process, and network visibility
- MITRE-based policy enforcement (FIM, cryptojacking protection, etc.)
- Auto-discovery of ingress/egress and whitelisting policies
Control Plane Access:
- PPS: Port 443
- SPIRE: Port 443
- Knox Gateway: Port 3000
K8s Misconfiguration Scanning¶
Deployment Mode: Kubernetes cronjob
Helm Command:
helm upgrade --install k8s-risk-assessment-job oci://public.ecr.aws/k9v9d5v2/k8s-risk-assessment-job \
--set accuknox.tenantID="[TENANTID]" \
--set accuknox.authToken="[AUTHTOKEN]" \
--set accuknox.cronTab="30 9 * * *" \
--set accuknox.clusterName="[CLUSTERNAME]" \
--set accuknox.URL="cspm.demo.accuknox.com" \
--set accuknox.label="[LABEL]" \
--version=v1.1.3
Features:
- Detection of misconfigurations and insecure configurations
- Includes checks for root containers, privilege escalation, and 100+ other rules
Control Plane Access:
- HTTPS access to Artifact Endpoint
K8s Identity & Entitlements Management¶
Deployment Mode: Kubernetes cronjob
Helm Command:
helm upgrade --install kiem-job oci://public.ecr.aws/k9v9d5v2/kiem-job \
--set accuknox.label="[LABEL]" \
--version v1.1.3 \
--set accuknox.URL="cspm.demo.accuknox.com" \
--set accuknox.authToken="[AUTHTOKEN]" \
--set accuknox.cronTab="30 9 * * *" \
--set accuknox.clusterName="[CLUSTERNAME]" \
--set accuknox.tenantID="[TENANTID]"
Features:
- Identifies overly permissive role bindings
- Graph-based identity view
- Detection of dangling service accounts and cross-namespace access
Control Plane Access:
- HTTPS access to Artifact Endpoint
K8s CIS Benchmarking¶
Deployment Mode: Kubernetes cronjob
Helm Command:
helm upgrade --install cis-k8s-job oci://public.ecr.aws/k9v9d5v2/cis-k8s-job \
--set accuknox.url="cspm.demo.accuknox.com" \
--set accuknox.tenantId="[TENANTID]" \
--set accuknox.authToken="[AUTHTOKEN]" \
--set accuknox.cronTab="30 9 * * *" \
--set accuknox.clusterName="[CLUSTERNAME]" \
--set accuknox.label="[LABEL]" \
--version v1.1.3
Features:
-
Benchmarks support for:
-
Kubernetes (generic)
- EKS
- AKS
-
GKE
-
OKE not currently supported
Control Plane Access:
- HTTPS access to Artifact Endpoint
DISA STIGs Support¶
Deployment Mode: Kubernetes cronjob
Helm Command:
helm upgrade --install k8s-stig-job oci://public.ecr.aws/k9v9d5v2/k8s-stig-job \
--set accuknox.url="cspm.demo.accuknox.com" \
--set accuknox.tenantId="[TENANTID]" \
--set accuknox.authToken="[AUTHTOKEN]" \
--set accuknox.cronTab="30 9 * * *" \
--set accuknox.clusterName="[CLUSTERNAME]" \
--set accuknox.label="[LABEL]" \
--version v1.1.3
Features:
- DISA Special Technical Implementation Guidelines (STIGs) compliance
Control Plane Access:
- HTTPS access to Artifact Endpoint
In-Cluster Container Image Scanning¶
Deployment Mode: CronJob (per node job)
Helm Command:
helm install kubeshield kubeshield-chart \
--set scan.tenantId="<TENANTID>" \
--set scan.artifactToken="<TOKEN>" \
--set scan.artifactEndpoint="https://cspm.demo.accuknox.com/api/v1/artifact/" \
--set scan.label="<LABEL>"
Features:
- Direct in-cluster image scanning (no registry access required)
- Scans cached images on nodes
- Reports sent to AccuKnox console for triage
Control Plane Access:
- HTTPS access to Artifact Endpoint
Admission Controller Support¶
AccuKnox Admission Controller enforces:
- Trusted registry enforcement for images
- Deployment compliance with security best practices (no root, no host mounts, etc.)
- Violations reported to AccuKnox Control Plane (visible under Monitors & Alerts)
Cluster Access to Control Plane¶
Each feature requires outbound (egress) HTTPS access only. Refer to the access notes under each feature for exact service and port requirements.