Kyverno
Kubernetes Native Policy Management: Secure and Automate Clusters Without Learning New Languages.
Automated Kubernetes security compliance auditing against CIS Benchmarks.
kube-bench is the industry-standard open-source tool designed to verify whether a Kubernetes deployment meets the security best practices defined by the Center for Internet Security (CIS) Kubernetes Benchmarks. Developed by Aqua Security and written in Go, it executes a series of tests against the master, control plane, and node components of a cluster. In the 2026 landscape, kube-bench remains a foundational element of the DevSecOps toolchain, having evolved to support highly specialized benchmarks for managed services including Amazon EKS, Azure AKS, and Google GKE. The tool operates by parsing YAML-defined test files, making it extensible for custom organizational policies. It is typically deployed as a containerized job or a DaemonSet, ensuring that infrastructure-as-code (IaC) templates and live environments remain drift-free and compliant. Its technical architecture allows for seamless integration with Prometheus for monitoring and various SIEMs via structured JSON output, positioning it as a critical first line of defense in automated cloud-native security posture management (CSPM).
Automatically identifies the running Kubernetes version and maps it to the corresponding CIS Benchmark version.
Kubernetes Native Policy Management: Secure and Automate Clusters Without Learning New Languages.
Security risk analysis for Kubernetes resources with precise score-based remediation.
Automated security auditing and remediation for high-integrity Kubernetes clusters.
Unified threat detection and response across endpoint, network, cloud, and identity datasets.
Verified feedback from the global deployment network.
Post queries, share implementation strategies, and help other users.
All security checks are defined in YAML files, allowing users to modify existing tests or write new ones without recompiling the binary.
Supports targeting specific components like 'master', 'node', 'etcd', and 'policies' individually.
Every failed test includes a detailed explanation and a command-line fix or configuration change recommendation.
Specialized configuration sets for Amazon EKS, Azure AKS, and Google GKE that account for the shared responsibility model.
Supports multiple output formats including JSON, JUnit, and TAP for integration with various developer tools.
Can be deployed as a Kubernetes DaemonSet to automatically audit every node in a cluster as it scales.
Manual audits cannot keep up with rapid Kubernetes configuration changes.
Registry Updated:2/7/2026
Standard CIS checks often fail on managed services due to inaccessible control planes.
Providing evidence of security posture for SOC2 or HIPAA audits.