DataDog / security-agent-policiesLinks
Policies for Security Agent - compliance and runtime checks
☆25Updated 2 weeks ago
Alternatives and similar repositories for security-agent-policies
Users that are interested in security-agent-policies are comparing it to the libraries listed below
Sorting:
- Trivy's misconfiguration scanning engine☆215Updated last year
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- ☆106Updated 2 months ago
- Documenting your Threat Models with HCL☆453Updated this week
- Static Analysis Library for Containers☆197Updated 2 years ago
- A reading list for software supply-chain security.☆366Updated 3 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆163Updated 2 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated 2 years ago
- Open source compliance tool for development platforms.☆286Updated 2 years ago
- Notice: Postee is no longer under active development or maintenance.☆206Updated 3 weeks ago
- Runtime security plug to protect user containers☆67Updated last week
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆26Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆97Updated last year
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆130Updated last week
- OWASP Kubernetes Security Testing Guide☆41Updated last month
- a tool to audit the istio service mesh☆174Updated 4 years ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆351Updated 10 months ago
- Exports primitive and predefined GCP IAM Roles and their permissions☆110Updated last week
- ☆57Updated 2 weeks ago
- Links and resources for the O'Reilly Kubernetes Security book☆101Updated 5 years ago
- ☆245Updated last year
- Threat matrix for CI/CD Pipeline☆760Updated last year
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 3 years ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆62Updated 3 years ago
- Curating Falco rules with MITRE ATT&CK Matrix☆88Updated last year
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆204Updated 2 years ago
- Kubernetes audit logging, when you don't control the control plane☆90Updated this week
- ☆44Updated 9 months ago
- Security scanning & static analysis tool☆93Updated last year