Skip to content
kube-bench

kube-bench

License: Free (Open-Source, Apache 2.0)
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated February 25, 2026
2 min read
Key Takeaways
  • Open-source CIS Kubernetes Benchmark checker by Aqua Security with 7.9k GitHub stars and 1.3k forks, widely adopted for Kubernetes compliance validation.
  • Supports 12+ CIS Benchmark versions covering Kubernetes 1.15 through 1.34, plus distribution-specific benchmarks for EKS, GKE, AKS, OpenShift, k3s, and RKE2.
  • Runs as a Kubernetes Job, DaemonSet, or standalone binary — checks control plane, worker nodes, etcd, and policy configurations against CIS recommendations.
  • YAML-based test definitions make it easy to customize checks or add organization-specific policies beyond the CIS baseline.

kube-bench is an open-source tool by Aqua Security that checks whether Kubernetes clusters are deployed according to the CIS Kubernetes Benchmark. It automates compliance validation for control plane, worker node, etcd, and policy configurations across 12+ Kubernetes distributions. 7.9k GitHub stars, 1.3k forks.

What is kube-bench?

kube-bench is a Go-based CLI tool that automates CIS Kubernetes Benchmark compliance checks. The CIS Kubernetes Benchmark is an industry-standard set of recommendations for configuring Kubernetes securely. kube-bench runs through each CIS recommendation, tests the cluster configuration, and reports what passes, what fails, and how to fix the failures.

The tool covers five areas from the CIS Benchmark: control plane components (API server, controller manager, scheduler), etcd, control plane configuration, worker nodes, and Kubernetes policies. Each check maps directly to a numbered CIS recommendation with a pass, fail, or warning result.

What Kubernetes distributions does kube-bench support?

kube-bench auto-detects the Kubernetes version and selects the correct benchmark. It supports 12+ CIS Benchmark versions for vanilla Kubernetes (1.15 through 1.34) and distribution-specific benchmarks for managed and specialized platforms:

PlatformBenchmark versions
KubernetesCIS 1.5.1, 1.6.0, 1.20, 1.23, 1.24, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12
Amazon EKSCIS 1.0.1, 1.1.0, 1.2.0, 1.5.0
Google GKECIS 1.0.0, 1.2.0, 1.6.0
Azure AKSCIS 1.0.0, 1.7.0
Alibaba ACKCIS 1.0.0
Red Hat OpenShiftCIS OCP 3.10–3.11, OCP4 1.1.0+
k3sCIS 1.6, 1.7, 1.24, 1.25
RKE / RKE2Multiple versions

For managed services like EKS, GKE, and AKS, kube-bench skips control plane checks since those nodes are not accessible — it focuses on worker node and policy configurations instead.

How does kube-bench work?

kube-bench uses YAML-based test definitions where each CIS recommendation maps to a file specifying what command to run, what output to expect, and the remediation steps if the check fails. This YAML-driven approach makes it straightforward to customize checks or add organization-specific policies on top of the CIS baseline.

kube-bench can run three ways:

  • Kubernetes Job — the recommended approach for most clusters. Deploy a Job that runs kube-bench against the node it lands on, then collect results from the pod logs.
  • DaemonSet — runs kube-bench on every node in the cluster. Useful when you need compliance results for all nodes at once.
  • Standalone binary — run directly on a host. Useful for local testing or environments where deploying into the cluster is not an option.

Output goes to stdout by default. Use --json for machine-readable output that integrates with CI/CD pipelines, SIEM systems, or compliance dashboards.

Who should use kube-bench?

kube-bench is designed for platform teams and security engineers who need to validate CIS Benchmark compliance across Kubernetes clusters. It fits compliance workflows where CIS adherence is a requirement: audit preparation, regulatory checks, or internal security baselines.

Organizations subject to PCI DSS, HIPAA, or SOC 2 often use CIS Kubernetes Benchmark results as evidence of cluster hardening.

If CIS compliance checking is all you need, kube-bench does it with minimal overhead. For broader Kubernetes security coverage (image scanning, runtime detection, multiple compliance frameworks), look at Kubescape or Falco for runtime monitoring.

What are kube-bench’s limitations?

kube-bench only checks configuration against CIS benchmarks. It does not scan container images, monitor runtime behavior, or detect active threats.

Results are point-in-time snapshots, so run it periodically or integrate it into CI/CD to catch configuration drift.

On managed Kubernetes services (EKS, GKE, AKS), some CIS checks do not apply because the cloud provider manages the control plane — kube-bench automatically skips those checks.

Frequently Asked Questions

What is kube-bench?
kube-bench is an open-source tool by Aqua Security with 7.9k GitHub stars that checks whether Kubernetes clusters are deployed according to the CIS Kubernetes Benchmark. It validates control plane, worker node, etcd, and policy configurations against CIS security recommendations.
Is kube-bench free to use?
Yes, kube-bench is free and open-source under the Apache 2.0 license. It is maintained by Aqua Security and available on GitHub. There are no commercial tiers or paid features.
What Kubernetes distributions does kube-bench support?
kube-bench supports vanilla Kubernetes (CIS Benchmark versions 1.5.1 through 1.12, covering K8s 1.15 to 1.34), Amazon EKS, Google GKE, Azure AKS, Alibaba ACK, Red Hat OpenShift (OCP 3.x and 4.x), k3s, RKE, RKE2, and TKGI. It auto-detects the Kubernetes version and selects the appropriate benchmark.
How do you run kube-bench?
kube-bench can run as a Kubernetes Job (recommended for most clusters), a DaemonSet (for checking all nodes), or as a standalone binary directly on the host. For managed services like EKS or GKE, run it as a Job since you cannot access the control plane nodes directly.
What is the difference between kube-bench and Kubescape?
kube-bench focuses specifically on CIS Kubernetes Benchmark compliance — it checks cluster configurations against CIS recommendations. Kubescape is broader, covering CIS, NSA-CISA, and MITRE ATT&CK frameworks plus image scanning and runtime detection. kube-bench is lighter-weight and purpose-built for CIS compliance.