What’s New in Kubernetes Security: More CIS Rules, Smarter Detection, and Expanded Coverage

by

Earlier this month, we introduced our Kubernetes Rule Pack, built to accelerate secure cluster configurations with out-of-the-box alignment to the CIS Kubernetes Benchmark v1.11.1. We started strong by covering critical areas like RBAC enforcement and pod-level hardening.

Today, we’re excited to announce the next phase of that rollout: a new set of Kubernetes CIS rules that go even deeper across identity, secrets management, networking, and workload isolation.

Kubernetes CIS rules import

🔍 What’s New in This Release?

This latest update builds on the foundational 5.1 and 5.2 controls by expanding into:

Secrets Management & Secure Workloads (5.4.x & 5.6.x):

  • Prefer Secrets as Files (5.4.1): Flags containers using secrets as environment variables, which are easier to exfiltrate and harder to rotate securely.
  • Encourage External Secret Stores (5.4.2): Identifies workloads not integrated with tools like HashiCorp Vault, AWS Secrets Manager, or Kubernetes CSI drivers.
  • Enforce Namespace Boundaries (5.6.1): Detects clusters lacking proper namespace segmentation—a must for multi-team or multi-tenant environments.
  • Security Context Compliance (5.6.2 – 5.6.4): Finds pods missing baseline settings like seccomp, runAsNonRoot, and those running in the default namespace.

These rules target real-world misconfigurations that attackers exploit: from overexposed secrets to overly permissive pods. They help you shift left on Kubernetes security while enabling dev teams to focus on shipping code.

Kubernetes 5.1.1 admin role usage rule

📌 What You Need to Do

  1. Review the rule pack in our GitHub repo
  2. Test against your dev or staging clusters using these new detection style rules
  3. Roll out enforcement incrementally by namespace or environment.
Brandon Pfeiffer
Brandon Pfeiffer

Brandon is a Software Engineer at JupiterOne with a deep background in full-stack development. While his expertise spans React, Angular, Node, C#, and PHP, he thrives on learning new technologies and rapidly building solutions that solve real user problems. Passionate about intuitive design and seamless workflows, Brandon focuses on creating experiences that make complex tasks feel effortless.

Keep Reading

Level Up Kubernetes Security with Our New Rule Pack Built on the CIS Benchmark | JupiterOne
June 3, 2025
Blog
Level Up Kubernetes Security with Our New Rule Pack Built on the CIS Benchmark

New Kubernetes Rule Pack covers 26 CIS controls for RBAC & Pod Security

Stop Stitching User Data Together. Get a Unified Identity Instead | JupiterOne
May 15, 2025
Blog
Stop Stitching User Data Together. Get a Unified Identity Instead.

Legacy IAM falls short. Identity first security uses continuous, contextual access controls to protect a decentralized world—far beyond the old perimeter.

Fast Track Vulnerability Prioritization with Orca Security and JupiterOne | JupiterOne
May 7, 2025
Blog
Fast Track Vulnerability Prioritization with Orca Security and JupiterOne

Unify cloud risk insights and asset context to prioritize and remediate vulnerabilities faster with the Orca Security and JupiterOne integration.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.