CrowdStrike / falcon-operatorLinks
☆56Updated last week
Alternatives and similar repositories for falcon-operator
Users that are interested in falcon-operator are comparing it to the libraries listed below
Sorting:
- Helm Charts for running CrowdStrike Falcon with Kubernetes☆93Updated 2 weeks ago
- Cloud Security Posture security policies☆32Updated last year
- All Aqua deployments options and aquactl configuration☆61Updated 3 weeks ago
- Use Snyk to find and fix vulnerabilities in your Kubernetes workloads☆93Updated this week
- Sysdig Terraform provider. Allow to handle Sysdig Secure policies as code.☆54Updated 2 weeks ago
- ☆114Updated last month
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated 11 months ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Kubernetes audit logging, when you don't control the control plane☆85Updated this week
- ☆228Updated 5 months ago
- ☆89Updated 4 months ago
- GKE CIS 1.1.0 Benchmark InSpec Profile☆27Updated 4 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Slack alert bot for matching Github Audit Events☆10Updated 10 months ago
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- ☆39Updated 4 years ago
- Runtime security plug to protect user containers☆66Updated this week
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- Demos for several kubernetes security features☆64Updated 8 months ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Updated 2 years ago
- Administrative tooling for Falco☆110Updated 2 weeks ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆110Updated 9 months ago
- Response Engine for managing threats in your Kubernetes☆170Updated 2 weeks ago
- (D)ocker(F)ile (C)onverter: CLI to convert Dockerfiles to use Chainguard Images and APKs in FROM and RUN lines etc.☆90Updated 2 weeks ago
- Check images in your charts for vulnerabilities☆42Updated 3 months ago
- Hexa Policy Orchestrator enables you to manage all of your access policies consistently across software providers.☆103Updated 4 months ago
- Falco plugins registry☆104Updated last week
- Helm Charts For Installing Aqua Security Components☆87Updated 3 weeks ago
- The Falco Project Community☆57Updated 3 months ago