CrowdStrike / falcon-operatorLinks
☆57Updated this week
Alternatives and similar repositories for falcon-operator
Users that are interested in falcon-operator are comparing it to the libraries listed below
Sorting:
- Helm Charts for running CrowdStrike Falcon with Kubernetes☆95Updated last week
- Cloud Security Posture security policies☆32Updated last year
- All Aqua deployments options and aquactl configuration☆62Updated last month
- Sysdig Terraform provider. Allow to handle Sysdig Secure policies as code.☆54Updated this week
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Slack alert bot for matching Github Audit Events☆10Updated last year
- Use Snyk to find and fix vulnerabilities in your Kubernetes workloads☆93Updated 3 weeks ago
- ☆114Updated 3 months ago
- The Aqua Security Provider for Terraform allows you to declaratively define the configuration of your Aqua platform.☆37Updated last week
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆29Updated last year
- Helm Charts For Installing Aqua Security Components☆88Updated last week
- Kubernetes audit logging, when you don't control the control plane☆88Updated last week
- Check images in your charts for vulnerabilities☆42Updated 4 months ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Updated 2 years ago
- Demos for several kubernetes security features☆64Updated 10 months ago
- a tool to audit the istio service mesh☆173Updated 4 years ago
- Microsoft Defender for Cloud threat matrix for Kubernetes☆28Updated 2 years ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆41Updated 2 years ago
- The Falco Project Community☆55Updated 3 weeks ago
- Automated testing, generation & manipulation of #osquery packs☆73Updated last year
- Generate a variety of suspect actions that are detected by Falco rulesets☆110Updated 5 months ago
- Sample code snippets for consuming the CloudSploit API☆13Updated 2 years ago
- Run individual controls or full compliance benchmarks for NSA CISA Kubernetes Hardening Guidance across all of your Kubernetes clusters u…☆31Updated 2 months ago
- ☆89Updated last week
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆128Updated this week
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆36Updated last year
- Terraform modules for Sumo Logic resources☆16Updated last week
- Kubernetes Common Configuration Scoring System☆122Updated 3 years ago
- ☆143Updated last month