aquasecurity / docker-bench
Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark
β215Updated 2 months ago
Alternatives and similar repositories for docker-bench:
Users that are interested in docker-bench are comparing it to the libraries listed below
- Container Security Workshop covering using Falco on Kubernetes.β105Updated 3 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.β162Updated last year
- π°πΈβοΈ For those interested in running Kubernetes in highly regulated environments, particularly financial servicesβ304Updated 2 years ago
- kube-scan: Octarine k8s cluster risk assessment toolβ802Updated 2 years ago
- Kubernetes Common Configuration Scoring Systemβ124Updated 2 years ago
- CIS Kubernetes Benchmark - InSpec Profileβ300Updated 7 months ago
- Dynamic Application and API Security Testingβ192Updated last year
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmarkβ167Updated 2 months ago
- Attacking and Defending Kubernetes Clusters: A Guided Tourβ206Updated 3 years ago
- Static Analysis Library for Containersβ198Updated last year
- CIS Docker Benchmark - InSpec Profileβ504Updated last year
- Connect Falco to your ecosystemβ580Updated last week
- Network security testing for Kubernetes DevSecOps workflowsβ373Updated 7 months ago
- Security risk analysis for Kubernetes resourcesβ1,300Updated last week
- β239Updated 6 months ago
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurationsβ¦β176Updated last year
- A deliberately vulnerable Kubernetes clusterβ124Updated last year
- Kubernetes RBAC static analysis & visualisation toolβ704Updated this week
- Help building an adaptive and fine-grained pod security policyβ330Updated last year
- Tool for auditing RBACs in Kubernetesβ216Updated last year
- A Blazing fast Security Auditing tool for Kubernetesβ996Updated 11 months ago
- Notice: Postee is no longer under active development or maintenance.β209Updated 3 weeks ago
- Use Trivy as a plug-in vulnerability scanner in the Harbor registryβ221Updated 6 months ago
- A security monitoring solution for Kubernetesβ132Updated last year
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Regoβ343Updated last week
- Security risk analysis for Kubernetes resourcesβ511Updated 2 months ago
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, worβ¦β474Updated 3 years ago
- Scan Kubernetes resource files , and helm charts for security configurations issues and best practices.β207Updated 2 years ago
- β93Updated last month
- A set of scripts inspired by CIS Kubernetes Benchmark that checks best-practices of Kubernetes installationsβ265Updated last year