Dataset Viewer

The dataset viewer is not available because its heuristics could not detect any supported data files. You can try uploading some data files, or configuring the data files location manually.

Kubernetes Security - Complete Dataset

A comprehensive bilingual (FR/EN) dataset covering misconfigurations, attack paths, and Q&A about Kubernetes security.

πŸ“Š Dataset Content

1. Kubernetes Misconfigurations (60+ entries)

  • Categories: RBAC, PodSecurity, NetworkPolicy, Secrets, ImageSecurity, RuntimeSecurity, Admission, Logging, APIServer, etcd
  • Fields: ID, name, category, descriptions FR/EN, risk level (Critical/High/Medium/Low)
  • Additional Details: remediation FR/EN, kubectl command for detection, CIS Benchmark reference, MITRE ATT&CK mapping
  • Affected Resources: Pod, Deployment, ServiceAccount, ClusterRole, etc.

Examples Covered:

  • Privileged containers and hostPID/hostNetwork
  • Missing network policies
  • Default service account with cluster-admin
  • Secrets in environment variables
  • Missing resource limits
  • Missing Pod Security Standards
  • Unrestricted NodePort
  • Exposed Kubernetes Dashboard
  • Unencrypted etcd
  • Missing audit logging

2. Kubernetes Attack Paths (30 scenarios)

  • Categories: ContainerEscape, PrivilegeEscalation, LateralMovement, DataExfiltration, Persistence, InitialAccess
  • Detailed Steps: step number, actions FR/EN, tools used, MITRE technique
  • Prerequisites: conditions necessary for attack
  • Detection: how to identify and prevent
  • Difficulty: Easy, Medium, Hard, Expert

Examples Covered:

  • Privilege escalation via default service account
  • Container escape via privileged containers
  • NetworkPolicy bypass via hostNetwork
  • Secrets extraction from ConfigMap
  • RBAC misconfiguration exploitation
  • Kubelet API exploitation
  • Direct etcd extraction
  • Container image supply chain attacks
  • Pod escape via runtime
  • And 20+ more...

3. Kubernetes Security Q&A (50 bilingual Q&A)

  • Coverage: best practices, security concepts, attack detection
  • Source URLs: deep backlinks to AYI-NEDJIMI Consultants articles

πŸ”— Resource Backlinks

All Q&A include deep backlinks to:

πŸ“š White Paper

Complete resource on Kubernetes security: Kubernetes Security White Paper

πŸ‘€ Author

AYI-NEDJIMI Consultants Experts in cybersecurity and cloud-native security

🏷️ Tags

kubernetes, k8s-security, container-security, rbac, pod-security, cloud-native, cybersecurity, ayinedjimi-consultants

πŸ“¦ Available Formats

  • JSON: Structured text format
  • Parquet: Optimized binary format for analysis

πŸ› οΈ Usage

Generate dataset

python generate_dataset.py fr   # French dataset
python generate_dataset.py en   # English dataset

Upload to HuggingFace

python upload_to_hf.py

πŸ“– Data Structure

Misconfigurations

{
  "id": 1,
  "name": "Privileged Container Execution",
  "category": "RuntimeSecurity",
  "description_fr": "...",
  "description_en": "...",
  "risk_level": "Critical",
  "remediation_fr": "...",
  "remediation_en": "...",
  "kubectl_check": "...",
  "cis_benchmark": "CIS 5.2.1",
  "mitre_mapping": "T1611",
  "affected_resources": ["Pod", "Deployment"]
}

Attack Paths

{
  "id": 1,
  "name": "Default Service Account Privilege Escalation",
  "category": "PrivilegeEscalation",
  "description_fr": "...",
  "description_en": "...",
  "steps": [
    {
      "step_num": 1,
      "action_fr": "...",
      "action_en": "...",
      "tools": ["kubectl"],
      "technique_mitre": "T1078"
    }
  ],
  "prerequisites_fr": "...",
  "prerequisites_en": "...",
  "detection_fr": "...",
  "detection_en": "...",
  "difficulty": "Easy"
}

Q&A

{
  "id": 1,
  "question": "What is a NetworkPolicy?",
  "answer": "...",
  "source_url": "https://ayinedjimi-consultants.fr/..."
}

πŸ”— HuggingFace Collection

This dataset is part of the collection: Cybersecurity Datasets and Tools by AYI-NEDJIMI

πŸ“‹ CIS Benchmark Coverage

The dataset covers main sections of CIS Kubernetes Benchmark:

  • CIS 1.x: Control Plane Configuration
  • CIS 2.x: etcd Configuration
  • CIS 4.x: Worker Node Configuration
  • CIS 5.x: Kubernetes Policies

🎯 Use Cases

  • Kubernetes security training
  • Kubernetes security certification preparation
  • Kubernetes security auditing
  • Misconfiguration identification
  • Attack simulation and threat modeling
  • Kubernetes defense development

⚠️ Disclaimer

This dataset is provided for educational and security research purposes. Use attack techniques only in authorized and controlled environments.

πŸ“ž Support

For more information:


Version: 1.0 Last Updated: 2026-02-13 Author: AYI-NEDJIMI Consultants

Author

Ayi NEDJIMI - Cybersecurity Consultant & Trainer | AI Expert

Related Articles

Free Cybersecurity Resources

Part of the Collection

This dataset is part of the Cybersecurity Datasets & Tools Collection by AYI-NEDJIMI Consultants.

Downloads last month
23

Collections including AYI-NEDJIMI/k8s-security-en