CrowdStrike / falcon-operatorLinks
☆57Updated 2 weeks ago
Alternatives and similar repositories for falcon-operator
Users that are interested in falcon-operator are comparing it to the libraries listed below
Sorting:
- Helm Charts for running CrowdStrike Falcon with Kubernetes☆91Updated 3 weeks ago
- Cloud Security Posture security policies☆32Updated last year
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Kubernetes audit logging, when you don't control the control plane☆85Updated this week
- ☆114Updated last month
- All Aqua deployments options and aquactl configuration☆61Updated this week
- Use Snyk to find and fix vulnerabilities in your Kubernetes workloads☆92Updated this week
- GKE CIS 1.1.0 Benchmark InSpec Profile☆27Updated 4 years ago
- Slack alert bot for matching Github Audit Events☆10Updated 10 months ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆31Updated 2 years ago
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆29Updated last year
- Generate a variety of suspect actions that are detected by Falco rulesets☆108Updated 3 months ago
- The Aqua Security Provider for Terraform allows you to declaratively define the configuration of your Aqua platform.☆37Updated this week
- ☆88Updated 3 months ago
- Sysdig Terraform provider. Allow to handle Sysdig Secure policies as code.☆54Updated last month
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- Runtime security plug to protect user containers☆66Updated last week
- (D)ocker(F)ile (C)onverter: CLI to convert Dockerfiles to use Chainguard Images and APKs in FROM and RUN lines etc.☆89Updated 3 weeks ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated 11 months ago
- ☆228Updated 5 months ago
- Run individual controls or full compliance benchmarks for NSA CISA Kubernetes Hardening Guidance across all of your Kubernetes clusters u…☆31Updated 2 weeks ago
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆125Updated last week
- ☆139Updated 6 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- An open source, cloud-native security to protect everything from build to runtime☆314Updated last week
- ☆38Updated 4 years ago
- ☆74Updated 4 months ago
- Hexa Policy Orchestrator enables you to manage all of your access policies consistently across software providers.☆103Updated 3 months ago