Vinum-Security / kubernetes-security-checklist
Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, workloads, dockerfile)
☆476Updated 3 years ago
Alternatives and similar repositories for kubernetes-security-checklist:
Users that are interested in kubernetes-security-checklist are comparing it to the libraries listed below
- OWASP Foundation Web Respository☆577Updated last year
- A curated list of awesome Kubernetes security resources☆913Updated last year
- ☆237Updated 6 months ago
- ☆406Updated 2 years ago
- 🧰 Multi Tool Kubernetes Pentest Image☆226Updated 6 months ago
- A deliberately vulnerable Kubernetes cluster☆124Updated last year
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆343Updated last year
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆195Updated this week
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated last month
- A curated list of resources about detecting threats and defending Kubernetes systems.☆375Updated last year
- A Blazing fast Security Auditing tool for Kubernetes☆996Updated 11 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆451Updated 8 months ago
- Kubernetes Security Training Platform - focusing on security mitigation☆943Updated 6 months ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆126Updated this week
- A curated list of awesome CI CD security resources☆535Updated 4 months ago
- Threat matrix for CI/CD Pipeline☆747Updated 8 months ago
- A collection of tools to improve your containerized apps security posture☆140Updated 9 months ago
- Tool for auditing RBACs in Kubernetes☆215Updated last year
- ☆93Updated last month
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆67Updated 4 years ago
- A curated list of Falco related tools, frameworks, blogs, podcasts, and articles☆201Updated 3 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆267Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆62Updated 9 months ago
- A collection of manifests that will create pods with elevated privileges.☆614Updated 2 years ago
- OWASP Foundation Web Respository☆81Updated last month
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆892Updated 2 weeks ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆272Updated 6 months ago
- Awesome resources about Security in Kubernetes☆41Updated 2 years ago
- References for CKS Exam Objectives - Certified Kubernetes Security Specialist☆145Updated last year
- ☆44Updated 3 years ago