aquasecurity / defsecLinks
Trivy's misconfiguration scanning engine
☆218Updated 6 months ago
Alternatives and similar repositories for defsec
Users that are interested in defsec are comparing it to the libraries listed below
Sorting:
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Notice: Postee is no longer under active development or maintenance.☆211Updated 2 months ago
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆125Updated this week
- Static Analysis Library for Containers☆198Updated 2 years ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆346Updated 4 months ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆106Updated 2 months ago
- Runtime security plug to protect user containers☆65Updated 3 weeks ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆161Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆83Updated last year
- Static analysis for CloudFormation templates to identify common misconfiguration☆57Updated 3 years ago
- Open source compliance tool for development platforms.☆288Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆107Updated 7 months ago
- Create Kubernetes AdmissionReview requests from Kubernetes resource manifests☆160Updated this week
- ☆100Updated 6 months ago
- Dynamic Application and API Security Testing☆192Updated 2 years ago
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆218Updated 6 months ago
- Documenting your Threat Models with HCL☆432Updated 2 months ago
- Falco plugins registry☆102Updated this week
- Administrative tooling for Falco☆110Updated last week
- Cloud Security Posture security policies☆31Updated 10 months ago
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆175Updated this week
- ☆54Updated this week
- ☆55Updated 2 weeks ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- book website☆70Updated 3 years ago
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆193Updated last year
- Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆462Updated last year
- Runtime Security Solution for your CI/CD Pipeline☆108Updated last month