What’s New in Kubernetes Security: More CIS Rules, Smarter Detection, and Expanded Coverage

by

Earlier this month, we introduced our Kubernetes Rule Pack, built to accelerate secure cluster configurations with out-of-the-box alignment to the CIS Kubernetes Benchmark v1.11.1. We started strong by covering critical areas like RBAC enforcement and pod-level hardening.

Today, we’re excited to announce the next phase of that rollout: a new set of Kubernetes CIS rules that go even deeper across identity, secrets management, networking, and workload isolation.

Kubernetes CIS rules import

🔍 What’s New in This Release?

This latest update builds on the foundational 5.1 and 5.2 controls by expanding into:

Secrets Management & Secure Workloads (5.4.x & 5.6.x):

  • Prefer Secrets as Files (5.4.1): Flags containers using secrets as environment variables, which are easier to exfiltrate and harder to rotate securely.
  • Encourage External Secret Stores (5.4.2): Identifies workloads not integrated with tools like HashiCorp Vault, AWS Secrets Manager, or Kubernetes CSI drivers.
  • Enforce Namespace Boundaries (5.6.1): Detects clusters lacking proper namespace segmentation—a must for multi-team or multi-tenant environments.
  • Security Context Compliance (5.6.2 – 5.6.4): Finds pods missing baseline settings like seccomp, runAsNonRoot, and those running in the default namespace.

These rules target real-world misconfigurations that attackers exploit: from overexposed secrets to overly permissive pods. They help you shift left on Kubernetes security while enabling dev teams to focus on shipping code.

Kubernetes 5.1.1 admin role usage rule

📌 What You Need to Do

  1. Review the rule pack in our GitHub repo
  2. Test against your dev or staging clusters using these new detection style rules
  3. Roll out enforcement incrementally by namespace or environment.
Brandon Pfeiffer
Brandon Pfeiffer

Brandon is a Software Engineer at JupiterOne with a deep background in full-stack development. While his expertise spans React, Angular, Node, C#, and PHP, he thrives on learning new technologies and rapidly building solutions that solve real user problems. Passionate about intuitive design and seamless workflows, Brandon focuses on creating experiences that make complex tasks feel effortless.

Keep Reading

Closing the Software Supply Chain Risk | JupiterOne
August 14, 2025
Blog
Closing the Software Supply Chain Risk

JupiterOne turns SBOMs into living intelligence—automated, enriched, and actionable to cut software supply chain risk fast.

5 Essential Tips for Using JupiterOne MCP Server | JupiterOne
August 12, 2025
Blog
5 Essential Tips for Using JupiterOne MCP Server

Discover 5 key tips for using JupiterOne MCP to automate risk insights, build dashboards, and streamline security with natural language prompts.

Launching the JupiterOne MCP Server: Supercharging Agentic AI for Security-First Enterprises | JupiterOne
July 28, 2025
Blog
Launching the JupiterOne MCP Server: Supercharging Agentic AI for Security-First Enterprises

The JupiterOne MCP Server helps security teams operationalize agentic AI—connecting models to live context, tools, and data without rebuilding your stack.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.