DataDog / container-security-resourcesLinks
## Auto-archived due to inactivity. ## A collection of container security resources
☆27Updated 9 months ago
Alternatives and similar repositories for container-security-resources
Users that are interested in container-security-resources are comparing it to the libraries listed below
Sorting:
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆492Updated 7 months ago
- CLI to convert Kubernetes specifications to ECS Fargate and vice-versa☆254Updated 2 years ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆369Updated 6 months ago
- Observability best practices on AWS☆292Updated 2 weeks ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆197Updated 2 weeks ago
- ☆14Updated 2 years ago
- A reading list for software supply-chain security.☆366Updated 3 years ago
- Add comments to pull requests where tfsec checks have failed☆169Updated 2 years ago
- A GitHub App that acts like a Security Token Service (STS) for the Github API☆301Updated this week
- Threat matrix for CI/CD Pipeline☆760Updated last year
- ☆164Updated 2 weeks ago
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆341Updated 7 months ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆767Updated last year
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆229Updated this week
- KYE: Know Your Enemies - Check external access on your AWS account☆129Updated 9 months ago
- Google Maps for AWS IAM☆262Updated last week
- JIT Groups is an open source application that lets you implement secure, self-service access management for Google Cloud using groups.☆284Updated last week
- A list of cloud security tools and vendors.☆183Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated last year
- Protect GitHub Actions with Tracee☆81Updated 11 months ago
- Runtime Security Solution for your CI/CD Pipeline☆111Updated last week
- ☆67Updated this week
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆125Updated 4 months ago
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆183Updated last week
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Updated last week
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆214Updated this week
- Cedar for Kubernetes brings the power of Cedar to Kubernetes authorization and admission validation, showing how cluster administrators c…☆140Updated 2 months ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Script to score images against CHPs criteria☆39Updated this week