aquasecurity / defsecLinks
Trivy's misconfiguration scanning engine
☆217Updated 7 months ago
Alternatives and similar repositories for defsec
Users that are interested in defsec are comparing it to the libraries listed below
Sorting:
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Notice: Postee is no longer under active development or maintenance.☆207Updated 2 months ago
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆125Updated last week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆350Updated 5 months ago
- Static Analysis Library for Containers☆198Updated 2 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆160Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Runtime security plug to protect user containers☆66Updated last week
- ☆102Updated 6 months ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆106Updated 3 months ago
- Open source compliance tool for development platforms.☆288Updated last year
- Dynamic Application and API Security Testing☆193Updated 2 years ago
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆220Updated 6 months ago
- Falco plugins registry☆102Updated this week
- Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
- Create Kubernetes AdmissionReview requests from Kubernetes resource manifests☆160Updated 3 weeks ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆57Updated 3 years ago
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆177Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆109Updated 7 months ago
- book website☆71Updated 3 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆83Updated last year
- A reading list for software supply-chain security.☆363Updated 2 years ago
- ☆55Updated this week
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆196Updated last year
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆217Updated this week
- Documenting your Threat Models with HCL☆433Updated 2 months ago
- A VS Code Extension for Trivy☆147Updated last week
- Kubernetes focused container assessment and context discovery tool for penetration testing☆464Updated last year
- BadRobot - Operator Security Audit Tool☆221Updated last week