DataDog / container-security-resourcesLinks
## Auto-archived due to inactivity. ## A collection of container security resources
☆27Updated 9 months ago
Alternatives and similar repositories for container-security-resources
Users that are interested in container-security-resources are comparing it to the libraries listed below
Sorting:
- ☆67Updated this week
- ☆165Updated 3 weeks ago
- CLI to convert Kubernetes specifications to ECS Fargate and vice-versa☆254Updated 2 years ago
- KYE: Know Your Enemies - Check external access on your AWS account☆129Updated 9 months ago
- Add comments to pull requests where tfsec checks have failed☆169Updated 2 years ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆369Updated 6 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- ☆14Updated 2 years ago
- Observability best practices on AWS☆292Updated 3 weeks ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆197Updated last week
- DevSecOps Pipeline using SAST + DAST and SCA tools☆72Updated 4 months ago
- A reading list for software supply-chain security.☆366Updated 3 years ago
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆229Updated last week
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆125Updated 4 months ago
- A list of cloud security tools and vendors.☆184Updated last year
- Run Falco in a GitHub Actions to detect suspicious behavior in your CI/CD☆45Updated 3 months ago
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆493Updated 7 months ago
- Runtime Security Solution for your CI/CD Pipeline☆112Updated last week
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆342Updated 7 months ago
- Google Maps for AWS IAM☆262Updated last week
- A collection of tools to improve your containerized apps security posture☆150Updated last year
- Terraform module for serverless certificate authority on AWS☆158Updated last week
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Updated last month
- ASH is an extensible, open source SAST, SCA, and IaC security scanner orchestration engine.☆556Updated this week
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆151Updated last month
- Trivy's misconfiguration scanning engine☆215Updated last year
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆187Updated last week
- Script to score images against CHPs criteria☆39Updated this week
- JIT Groups is an open source application that lets you implement secure, self-service access management for Google Cloud using groups.☆284Updated last week
- KBOM - Kubernetes Bill of Materials☆323Updated 6 months ago