OWASP / www-project-devsecops-guidelineLinks
The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use in this matter. Also, the project is trying to help us promote the shift-left security culture in our development process.
☆73Updated 2 weeks ago
Alternatives and similar repositories for www-project-devsecops-guideline
Users that are interested in www-project-devsecops-guideline are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆99Updated last week
- ☆418Updated 2 years ago
- OWASP Kubernetes security and compliance tool [WIP]☆106Updated 2 years ago
- OWASP Foundation Web Respository☆56Updated 2 weeks ago
- ☆542Updated this week
- A deliberately vulnerable Kubernetes cluster☆129Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, wor…☆481Updated 3 years ago
- OWASP Foundation Web Respository☆595Updated 2 weeks ago
- DevSecOpsGuides☆191Updated 6 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆289Updated last year
- OWASP Code Review Guide Web Repository☆143Updated 3 years ago
- Scans your Github Actions for security issues☆86Updated 3 weeks ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆108Updated 10 months ago
- OWASP Foundation Web Respository☆47Updated last week
- A full insecure kubernetes application for testing security tools☆89Updated 6 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆111Updated last year
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆68Updated 4 years ago
- Awesome resources about Security in Kubernetes☆46Updated 2 years ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆189Updated last month
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 11 months ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆362Updated last month
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆284Updated 2 years ago
- DevSecOps Pipeline using SAST + DAST and SCA tools☆70Updated 3 weeks ago
- A utility to (re-)import findings and language data into DefectDojo☆43Updated last year
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆197Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 3 months ago
- Security Remediation Guides☆740Updated 2 weeks ago
- Security Champions Playbook v 2.1☆383Updated 2 years ago
- A curated list of Awesome Security Challenges.☆197Updated 11 months ago