DSOI-ALL / devops-microcosmLinks
☆38Updated 3 years ago
Alternatives and similar repositories for devops-microcosm
Users that are interested in devops-microcosm are comparing it to the libraries listed below
Sorting:
- A continuous security pipeline demo for the AWS DevSecOps Workshop.☆45Updated 5 years ago
- ChaoSlingr: Introducing Security into Chaos Testing☆68Updated 6 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆181Updated 6 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- A very vulnerable serverless application in AWS Lambda☆96Updated 5 years ago
- Helm chart to deploy Trend Micro Deep Security Smart Check.☆45Updated last year
- Example detection of compromise credentials in AWS☆122Updated 7 years ago
- An actuary is a business professional who analyzes the financial consequences of risk.☆80Updated 7 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive co…☆20Updated 6 months ago
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆18Updated 5 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆78Updated 7 months ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- ☆84Updated 2 years ago
- CIS Kubernetes Benchmark - InSpec Profile☆304Updated last year
- Links and resources for the O'Reilly Kubernetes Security book☆98Updated 4 years ago
- The clever vulnerability dependency finder☆97Updated 3 years ago
- A Docker build for OWASP Zed Attack Proxy to be used in CI/CD pipelines☆27Updated 5 years ago
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- A static analysis tool for Terraform plans.☆45Updated 2 years ago
- The original AWS security enforcer™☆61Updated 6 years ago
- devops and audit, together forever☆30Updated 7 years ago
- Container Security Workshop covering using Falco on Kubernetes.☆106Updated 4 years ago
- Creates a CloudFormation stack for running Security Monkey☆27Updated 6 years ago
- CloudSplaining on AWS Managed Policies☆44Updated this week
- Framework for reviewing and responding to events in AWS Flow Logs using Lambda Function☆46Updated 2 weeks ago
- ☆20Updated 6 years ago
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆110Updated 6 months ago