CINXE.COM
KubeArmor | DigitalOcean Marketplace 1-Click App
<!DOCTYPE html><html lang="en-US"><head><meta charSet="utf-8"/><meta name="viewport" content="initial-scale=1.0, width=device-width"/><meta property="og:locale" content="en_US"/><meta property="og:site_name" content="DigitalOcean"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary"/><meta name="twitter:site" content="@DigitalOcean"/><meta name="twitter:creator" content="@DigitalOcean"/><title>KubeArmor | DigitalOcean Marketplace 1-Click App</title><meta property="og:title" content="KubeArmor | DigitalOcean Marketplace 1-Click App"/><meta name="description" content="KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level. KubeArmor leverages Linux security modules (LSMs) such as AppArmor, SELinux, or BPF-LSM to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF."/><meta property="og:description" content="KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level. KubeArmor leverages Linux security modules (LSMs) such as AppArmor, SELinux, or BPF-LSM to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF."/><meta property="og:url" content="https://marketplace.digitalocean.com/apps/kubearmor"/><link rel="canonical" href="https://marketplace.digitalocean.com/apps/kubearmor"/><meta property="og:image" content="https://marketplace-assets.digitalocean.com/logos/accuknox-kubearmor.png"/><meta property="og:image:alt" content="KubeArmor"/><meta name="next-head-count" content="16"/><link rel="apple-touch-icon" sizes="180x180" href="/static/apple-touch-icon.png"/><link rel="icon" type="image/png" sizes="32x32" href="/static/favicon-32x32.png"/><link rel="icon" type="image/png" sizes="16x16" href="/static/favicon-16x16.png"/><link rel="mask-icon" href="/static/mask-icon.svg" color="#3387ff"/><link rel="manifest" href="/static/site.webmanifest"/><link rel="manifest" href="/static/manifest.json"/><link rel="shortcut icon" href="/static/favicon.ico"/><meta name="msapplication-TileColor" color="#3387ff"/><meta name="msapplication-config" content="/static/browserconfig.xml"/><script>(function(d) { var config = { kitId: 'ryt7tqg', scriptTimeout: 3000, async: true, }, h = d.documentElement, t = setTimeout(function() { h.className = h.className.replace(/wf-loading/g, '') + ' wf-inactive'; }, config.scriptTimeout), tk = d.createElement('script'), f = false, s = d.getElementsByTagName('script')[0], a; h.className += ' wf-loading'; tk.src = 'https://use.typekit.net/' + config.kitId + '.js'; tk.async = true; tk.onload = tk.onreadystatechange = function() { a = this.readyState; if (f || (a && a != 'complete' && a != 'loaded')) return; f = true; clearTimeout(t); try { Typekit.load(config); } catch (e) {} }; s.parentNode.insertBefore(tk, s); })(document);</script><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script src="/_next/static/chunks/webpack-c5b763cce869ae2f.js" defer=""></script><script src="/_next/static/chunks/framework-5e43787888d74ae0.js" defer=""></script><script src="/_next/static/chunks/main-69b1178c35959344.js" defer=""></script><script src="/_next/static/chunks/pages/_app-941f69a87693113d.js" defer=""></script><script src="/_next/static/chunks/29107295-c3c12e6f8bf94c9b.js" defer=""></script><script src="/_next/static/chunks/306-50ad5cefa1f1f797.js" defer=""></script><script src="/_next/static/chunks/184-16264ab4090b9fc0.js" defer=""></script><script src="/_next/static/chunks/653-94e94f664e10e199.js" defer=""></script><script src="/_next/static/chunks/392-1c68715572c8b6a7.js" defer=""></script><script src="/_next/static/chunks/856-869edc73f922b12c.js" defer=""></script><script src="/_next/static/chunks/422-800f661cd2bd02f0.js" defer=""></script><script src="/_next/static/chunks/381-cf3f275c7d80ba5e.js" defer=""></script><script src="/_next/static/chunks/504-b7a25c884a3964cb.js" defer=""></script><script src="/_next/static/chunks/148-e907f757dfebb7b7.js" defer=""></script><script src="/_next/static/chunks/pages/apps/%5BsafeName%5D-67b2d4785cbd7131.js" defer=""></script><script src="/_next/static/a6c7481cc581c199724148d2696c33723359af71/_buildManifest.js" defer=""></script><script src="/_next/static/a6c7481cc581c199724148d2696c33723359af71/_ssgManifest.js" defer=""></script><style data-styled="" data-styled-version="5.3.5"></style></head><body><div><svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" style="position: absolute; width: 0; height: 0" aria-hidden="true" id="__SVG_SPRITE_NODE__"></svg></div><div id="__next" data-reactroot=""></div><script id="__NEXT_DATA__" type="application/json">{"props":{"headers":{"host":"marketplace.digitalocean.com","cf-ray":"9141b4957dc46005-SIN","cf-connecting-ip":"8.222.208.146","user-agent":"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; .NET CLR 3.0.04506; .NET CLR 3.5.21022; .NET CLR 1.0.3705; .NET CLR 1.1.4322)","accept-encoding":"gzip, br","cf-ipcountry":"SG","cdn-loop":"cloudflare; loops=1","accept":"*/*","cf-visitor":"{\"scheme\":\"https\"}","x-forwarded-proto":"https","x-forwarded-for":"8.222.208.146, 172.70.143.201","connection":"close"},"pageProps":{"preview":false,"previewData":{},"initialApolloState":{},"safeName":"kubearmor","app":{"app_id":"017b265dda4a2095db560c7f","name":"KubeArmor","developer_id":"3713","developer":{"name":"AccuKnox Inc. ","custom_data":null,"__typename":"Developer"},"type":"kubernetes","safe_name":["kubearmor"],"created":{"seconds":null,"__typename":"Timestamp"},"is_latest_version":null,"is_live":true,"status":{"value":"approved","__typename":"AppStatus"},"custom_data":{"version":"1.1.0","os_version":null,"description":"\u003cp\u003eKubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level.\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003eKubeArmor leverages Linux security modules (LSMs) such as AppArmor, SELinux, or BPF-LSM to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF.\u003c/p\u003e\n\u003cp\u003e💪 \u003cstrong\u003eHarden Infrastructure\u003c/strong\u003e\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e⛓️ Protect critical paths such as cert bundles\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e📋 MITRE, STIGs, CIS based rules\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e🛅 Restrict access to raw DB table \u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e💍\u003cstrong\u003eLeast Permissive Access\u003c/strong\u003e\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e🚥 Process Whitelisting\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e🚥 Network Whitelisting\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e🎛️ Control access to sensitive assets\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e🔭 \u003cstrong\u003eApplication Behavior\u003c/strong\u003e\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e🧬 Process execs, File System accesses\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e🧭 Service binds, Ingress, Egress connections\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e🔬 Sensitive system call profiling \u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e❄️ \u003cstrong\u003eDeployment Models\u003c/strong\u003e\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e☸️ Kubernetes Deployment\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e🐋 Containerized Deployment\u003cbr/\u003e\u003c/p\u003e\n\u003cp\u003e💻 VM/Bare-Metal Deployment\u003c/p\u003e","summary":"KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level.\n\n\nKubeArmor leverages Linux security modules (LSMs) such as AppArmor, SELinux, or BPF-LSM to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF.","icon":"https://marketplace-assets.digitalocean.com/logos/accuknox-kubearmor.png","image_label":null,"image_id":null,"create_app":"https://cloud.digitalocean.com/kubernetes/clusters/new?addonslug=kubearmor-operator\u0026nodePools=s-1vcpu-2gb%3A3","tags":["Security","Kubernetes"],"software_included":null,"getting_started":"\u003cp\u003eAfter Deploying see the details on how to utilize your KubeArmor app, you can read more at \u003ca href=\"https://github.com/kubearmor/KubeArmor/blob/main/getting-started/deployment_guide.md\"\u003ehttps://github.com/kubearmor/KubeArmor/blob/main/getting-started/deployment_guide.md\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eRefer to \u003ca href=\"https://kubearmor.io/\"\u003ehttps://kubearmor.io/\u003c/a\u003e for more information, join \u003ca href=\"https://join.slack.com/t/kubearmor/shared_invite/zt-1ltmqdbc6-rSHw~LM6MesZZasmP2hAcA\"\u003eslack channel\u003c/a\u003e for support\u003c/p\u003e","support":{"hours":null,"url":"https://kubearmor.io/","email":"support@accuknox.com","timezone":"Asia/Kolkata","terms_url":null,"__typename":"Support"},"external_label":null,"addon_slug":"kubearmor-operator","additional_links":null,"port":null,"quick_access_enabled":null,"access_path":null,"__typename":"AppCustomData"},"__typename":"App"}},"apolloState":{},"cookies":{},"__N_SSP":true},"page":"/apps/[safeName]","query":{"safeName":"kubearmor"},"buildId":"a6c7481cc581c199724148d2696c33723359af71","runtimeConfig":{"APP_ENV":"production","SITE_URL":"https://marketplace.digitalocean.com","CLOUD_URL":"https://cloud.digitalocean.com","APOLLO_CLIENT_URI":"https://cloud.digitalocean.com","VENDOR_PORTAL_PROXY_URI":"https://api.digitalocean.com/api/v2/vendor-portal","ALGOLIA_MARKETPLACE_INDEX":"production_MARKETPLACE","GOOGLE_TAG_MANAGER":"GTM-KHWBBT","SEGMENT_WRITE_KEY":"eodkqsm339","imageDomains":["marketplace-assets.digitalocean.com","images.prismic.io","prismic-io.s3.amazonaws.com"]},"isFallback":false,"gssp":true,"customServer":true,"appGip":true,"scriptLoader":[]}</script><script strategy="afterInteractive">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-KHWBBT');</script><script strategy="afterInteractive">!function(){var analytics=window.analytics=window.analytics||[];if(!analytics.initialize)if(analytics.invoked)window.console&&console.error&&console.error("Segment snippet included twice.");else{analytics.invoked=!0;analytics.methods=["trackSubmit","trackClick","trackLink","trackForm","pageview","identify","reset","group","track","ready","alias","debug","page","once","off","on"];analytics.factory=function(t){return function(){var e=Array.prototype.slice.call(arguments);e.unshift(t);analytics.push(e);return analytics}};for(var t=0;t<analytics.methods.length;t++){var e=analytics.methods[t];analytics[e]=analytics.factory(e)}analytics.load=function(t,e){var n=document.createElement("script");n.type="text/javascript";n.async=!0;n.src="https://segment.digitalocean.com/analytics.js/v1/"+t+"/analytics.min.js";var a=document.getElementsByTagName("script")[0];a.parentNode.insertBefore(n,a);analytics._loadOptions=e};analytics.SNIPPET_VERSION="4.15.3"; analytics.load('eodkqsm339'); analytics.page(); }}();</script></body></html>