Foundations

KSPM vs CNAPP

Short answer

KSPM (Kubernetes Security Posture Management) is a subset of CNAPP focused on the Kubernetes layer: RBAC, workloads, admission, network policies. CNAPP is the broader category that bundles KSPM with CSPM (cloud posture), container vulnerability scanning, IaC scanning, and runtime security. A team running mostly on Kubernetes often starts with KSPM and grows into a Kubernetes-first CNAPP. A team with most of its workloads on cloud services outside Kubernetes typically starts with CSPM and adds KSPM later.

The short version

Every CNAPP contains a KSPM module. Not every KSPM tool is a full CNAPP. If the question is "what is going on inside my Kubernetes cluster?" you need KSPM. If the question is "what is the security posture of my whole cloud estate, including Kubernetes?" you need CNAPP.

Feature-by-feature overview

Capability KSPM (standalone) CNAPP
Kubernetes misconfig scan (Pod Security, CIS) Yes Yes
Kubernetes RBAC / identity analysis Yes Yes
Container image vulnerability scanning Sometimes Yes
Runtime threat detection (eBPF) Sometimes Yes
Admission control policies Sometimes Yes
Cloud provider posture (AWS, GCP, Azure) No Yes
IaC scanning (Terraform, Helm, Kustomize) No Yes
Secrets discovery in cloud storage No Yes
Cross-resource attack path analysis Sometimes Yes

When KSPM alone is enough

If an organization runs almost entirely on Kubernetes (self-hosted clusters, GKE-heavy teams, platform engineering shops), KSPM combined with image scanning and admission control covers most of the real risk. Paying CNAPP pricing for extensive cloud-posture rules that go unused is an expensive gap filler.

When a full CNAPP pays off

If the footprint spans meaningful AWS, GCP, or Azure workloads outside Kubernetes (Lambda functions, RDS databases, S3 buckets with customer data, IAM roles used by non-cluster services), a CNAPP consolidates those into the same graph as the Kubernetes resources. That is the only way to ask "can this cloud IAM role reach any Kubernetes workload?"

How Juliet fits

Juliet is a Kubernetes-first CNAPP. KSPM depth (graph-based RBAC, built-in admission, multi-framework compliance, runtime eBPF detection) matches specialized KSPM tools. Optional cloud collectors extend the same graph into AWS, with GCP and Azure on the roadmap. A team that starts on the free Kubernetes-only tier can grow into cloud coverage without switching vendors.

Frequently asked about kspm vs cnapp

Is KSPM a real category or just marketing?

Real category. Gartner tracks CNAPP, and KSPM is the Kubernetes-focused slice within it. Standalone KSPM vendors tend to expand into adjacent CNAPP features over time.

Can I use KSPM and CSPM together?

Yes. A common staged approach uses separate KSPM and CSPM tools until the seams (two dashboards, two alert feeds, no shared graph) become painful. That is the problem CNAPP was designed to address.

Which should I adopt first?

Start with whichever environment holds the most critical workloads. For teams running production on Kubernetes, KSPM is usually the first dollar. For teams whose core data sits in cloud databases or serverless, CSPM comes first.

Do CNAPPs always include runtime detection?

Not always. Some vendors position runtime (CDR, Cloud Detection and Response) as a separate tier. Before buying, check that the CNAPP's runtime module uses eBPF (kernel-level, no sidecar) rather than a DaemonSet sidecar per pod.

See this in your clusters

Juliet maps your Kubernetes security posture as a graph and ranks findings by reachable attack paths, not just CVSS. Free tier, five-minute setup, no credit card.