What’s New in Kubernetes Security: More CIS Rules, Smarter Detection, and Expanded Coverage

by

Earlier this month, we introduced our Kubernetes Rule Pack, built to accelerate secure cluster configurations with out-of-the-box alignment to the CIS Kubernetes Benchmark v1.11.1. We started strong by covering critical areas like RBAC enforcement and pod-level hardening.

Today, we’re excited to announce the next phase of that rollout: a new set of Kubernetes CIS rules that go even deeper across identity, secrets management, networking, and workload isolation.

Kubernetes CIS rules import

🔍 What’s New in This Release?

This latest update builds on the foundational 5.1 and 5.2 controls by expanding into:

Secrets Management & Secure Workloads (5.4.x & 5.6.x):

  • Prefer Secrets as Files (5.4.1): Flags containers using secrets as environment variables, which are easier to exfiltrate and harder to rotate securely.
  • Encourage External Secret Stores (5.4.2): Identifies workloads not integrated with tools like HashiCorp Vault, AWS Secrets Manager, or Kubernetes CSI drivers.
  • Enforce Namespace Boundaries (5.6.1): Detects clusters lacking proper namespace segmentation—a must for multi-team or multi-tenant environments.
  • Security Context Compliance (5.6.2 – 5.6.4): Finds pods missing baseline settings like seccomp, runAsNonRoot, and those running in the default namespace.

These rules target real-world misconfigurations that attackers exploit: from overexposed secrets to overly permissive pods. They help you shift left on Kubernetes security while enabling dev teams to focus on shipping code.

Kubernetes 5.1.1 admin role usage rule

📌 What You Need to Do

  1. Review the rule pack in our GitHub repo
  2. Test against your dev or staging clusters using these new detection style rules
  3. Roll out enforcement incrementally by namespace or environment.
Brandon Pfeiffer
Brandon Pfeiffer

Brandon is a Software Engineer at JupiterOne with a deep background in full-stack development. While his expertise spans React, Angular, Node, C#, and PHP, he thrives on learning new technologies and rapidly building solutions that solve real user problems. Passionate about intuitive design and seamless workflows, Brandon focuses on creating experiences that make complex tasks feel effortless.

Keep Reading

JupiterOne Blog | Project Glasswing Proves That "Just Patch the Criticals" Is Dead. Here's What Comes Next.
April 8, 2026
Blog
Project Glasswing Proves That "Just Patch the Criticals" Is Dead. Here's What Comes Next.

Anthropic's Project Glasswing has shown that AI can now chain together vulnerabilities and exploit software faster than almost any human. That changes everything.

AI is Everywhere in Security. Accuracy Requires a Knowledge Graph| JupiterOne
March 30, 2026
Blog
AI is Everywhere at RSAC. Accuracy is Not.

Learn what RSAC 2026 reveals about the AI accuracy gap in security — and why agentic platforms without a knowledge graph add risk faster than they reduce it.

When the Control Plane Becomes the Battlefield: Lessons from the Stryker Incident | JupiterOne
March 17, 2026
Blog
When the Control Plane Becomes the Battlefield: Lessons from the Stryker Incident

Cyberattack reveals control-plane risk and how graph-native visibility helps security teams map attack paths and blast radius before an incident strikes.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.