DataDog / security-agent-policies
Policies for Security Agent - compliance and runtime checks
☆24Updated last week
Alternatives and similar repositories for security-agent-policies:
Users that are interested in security-agent-policies are comparing it to the libraries listed below
- Trivy's misconfiguration scanning engine☆218Updated 3 months ago
- Documenting your Threat Models with HCL☆426Updated 7 months ago
- Security configuration checks for popular cloud native applications and infrastructure.☆118Updated 3 years ago
- Protect GitHub Actions with Tracee☆81Updated 2 months ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆138Updated 2 years ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆339Updated 3 weeks ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆82Updated 3 months ago
- Cloud Security Posture security policies☆29Updated 7 months ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆125Updated last week
- ☆54Updated last week
- Falco rule repository☆121Updated this week
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆58Updated last year
- Kubernetes audit logging, when you don't control the control plane☆74Updated this week
- Notice: Postee is no longer under active development or maintenance.☆210Updated 2 weeks ago
- A tool to check the security settings of Github Organizations.☆71Updated last year
- Static Analysis Library for Containers☆199Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆42Updated 10 months ago
- A reading list for software supply-chain security.☆362Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated last month
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆85Updated this week
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆70Updated 2 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆330Updated last year
- A tool to create, transform and attest VEX metadata☆134Updated this week
- Falco plugins registry☆92Updated this week
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- Open source compliance tool for development platforms.☆286Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆92Updated 2 months ago