DSOI-ALL / devops-microcosmLinks
☆38Updated 3 years ago
Alternatives and similar repositories for devops-microcosm
Users that are interested in devops-microcosm are comparing it to the libraries listed below
Sorting:
- ChaoSlingr: Introducing Security into Chaos Testing☆69Updated 6 years ago
- A continuous security pipeline demo for the AWS DevSecOps Workshop.☆44Updated 5 years ago
- k8s audit repo☆229Updated 6 years ago
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆182Updated 6 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆77Updated 2 months ago
- An actuary is a business professional who analyzes the financial consequences of risk.☆81Updated 8 years ago
- DevSecOps Toolchain☆112Updated 7 years ago
- A very vulnerable serverless application in AWS Lambda☆96Updated 6 years ago
- CIS Kubernetes Benchmark - InSpec Profile☆307Updated last year
- Container Security Verification Standard☆58Updated 6 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆110Updated 9 months ago
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆18Updated 5 years ago
- ☆21Updated 7 years ago
- devops and audit, together forever☆30Updated 7 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Container Security Workshop covering using Falco on Kubernetes.☆106Updated 4 years ago
- The clever vulnerability dependency finder☆96Updated 3 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- ☆107Updated 2 years ago
- ☆35Updated 4 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆100Updated 4 years ago
- Helm chart to deploy Trend Micro Deep Security Smart Check.☆45Updated last year
- A hands-on walkthrough for creating an extremely insecure Kubernetes cluster and then hardening it, step by step.☆200Updated 6 years ago
- Ansible Playbooks for Security Automation with Ansible2 book☆102Updated 7 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 6 years ago
- A collection of DevSecOps reference architectures☆70Updated 4 years ago
- Example detection of compromise credentials in AWS☆122Updated 7 years ago