Roadmap Overview
kguardian is continuously evolving to support more Kubernetes security resources. This page outlines our plans for future capabilities.Want to contribute? Check out our GitHub Discussions to participate in roadmap planning or our Contributing Guide to help build these features!
Planned Resources
✅ Network Policies
Status: Generally Available (v1.0.0)
- Kubernetes NetworkPolicy
- Cilium NetworkPolicy
- Cilium ClusterwideNetworkPolicy
✅ Seccomp Profiles
Status: Generally Available (v1.0.0)
- OCI seccomp JSON format
- Architecture-aware profiles
- Customizable default actions
🚧 AppArmor Profiles
Status: In Development (Target: v1.2.0)
- Generate from observed file access
- Network capability restrictions
- Integration with Security Profiles Operator
📋 SELinux Policies
Status: Planned (Target: v1.3.0)
- Type enforcement rules
- File context generation
- Process domain transitions
📋 Pod Security Standards
Status: Planned (Target: v1.4.0)
- Auto-generate PSS labels
- Compliance validation
- Migration recommendations
💡 Resource Quotas & Limits
Status: Under Consideration
- Observed CPU/memory usage
- Suggested request/limit values
- Autoscaling recommendations
AppArmor Profiles (v1.2.0)
Target Release: Q2 2025
Status: In active development
Capabilities
File Access Rules
File Access Rules
kguardian will observe:
- File read/write operations via eBPF (
openat,read,writesyscalls) - Directory listings and creation
- Execution of binaries
Network Capabilities
Network Capabilities
Based on observed network activity:
Capability Restrictions
Capability Restrictions
Limit Linux capabilities:
Integration
Integration
- Export as standalone AppArmor profiles
- Integration with Security Profiles Operator
- Auto-apply via
AppArmorProfileCRD
CLI Usage (Planned)
SELinux Policies (v1.3.0)
Target Release: Q3 2025
Status: Planning phase
Capabilities
Type Enforcement
Type Enforcement
Generate custom SELinux types for pods:
- Observe process domains and transitions
- File type associations
- Network access rules per type
File Contexts
File Contexts
Auto-generate file context mappings:
Integration Challenges
Integration Challenges
SELinux support is complex:
- Requires kernel support and enabled enforcement
- Policy compilation and loading
- Container runtime integration
- Using
udicafor container policy generation - CRI-O selinuxOptions integration
- Collaboration with SELinux community
Pod Security Standards (v1.4.0)
Target Release: Q4 2025
Status: Research phase
Capabilities
Compliance Detection
Compliance Detection
Analyze observed pod behavior and suggest appropriate PSS level:
- Privileged: Uses host namespaces, runs as root, etc.
- Baseline: Minimal restrictions, prevents known privilege escalations
- Restricted: Hardened, follows current security best practices
Automatic Labeling
Automatic Labeling
Generate namespace labels for PSS enforcement:
Migration Assistance
Migration Assistance
Help migrate from PSPs or insecure configurations:
- Identify pods violating target PSS level
- Suggest PodSecurityContext changes
- Generate compliant manifests
Resource Recommendations
Status: Under consideration - feedback welcome!
Concept
Challenges
- Requires metrics-server or Prometheus integration
- Observation period must cover peak loads
- Needs statistical analysis (percentiles, outliers)
- May overlap with VPA (Vertical Pod Autoscaler)
Other Ideas
We’re collecting community feedback on:Falco Rules Generation
Generate runtime security rules from observed behavior
OPA/Gatekeeper Policies
Create admission control policies based on cluster patterns
Service Mesh Policies
Generate Istio/Linkerd AuthorizationPolicies
RBAC Recommendations
Suggest least-privilege RBAC roles
How You Can Help
1
Vote on Features
Star or comment on GitHub Issues for features you want most.
2
Share Use Cases
Tell us how you’d use these resources in Discussions.
3
Contribute Code
Pick up an issue labeled
help-wanted or good-first-issue and submit a PR!4
Sponsor Development
Commercial licenses help fund feature development. Contact us for enterprise support.
Check out planned features and milestones
See the full release roadmap →