DataDog / security-agent-policiesLinks
Policies for Security Agent - compliance and runtime checks
☆25Updated last week
Alternatives and similar repositories for security-agent-policies
Users that are interested in security-agent-policies are comparing it to the libraries listed below
Sorting:
- Trivy's misconfiguration scanning engine☆216Updated 8 months ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Static Analysis Library for Containers☆198Updated 2 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 3 years ago
- A reading list for software supply-chain security.☆364Updated 2 years ago
- Open source compliance tool for development platforms.☆287Updated last year
- Documenting your Threat Models with HCL☆433Updated this week
- Notice: Postee is no longer under active development or maintenance.☆208Updated last month
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆127Updated this week
- Protect GitHub Actions with Tracee☆82Updated 8 months ago
- Runtime security plug to protect user containers☆66Updated last week
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆85Updated last year
- ☆102Updated 8 months ago
- ☆56Updated 3 weeks ago
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- Threat matrix for CI/CD Pipeline☆760Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆334Updated 5 months ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆56Updated 3 years ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆110Updated 4 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- Links and resources for the O'Reilly Kubernetes Security book☆99Updated 4 years ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Updated 6 months ago
- ☆228Updated 5 months ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆161Updated last year
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆100Updated this week
- ☆114Updated last month
- ☆243Updated last year
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆24Updated 9 months ago
- Runtime Security Solution for your CI/CD Pipeline☆109Updated 3 months ago