aquasecurity / docker-bench
Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark
β212Updated this week
Alternatives and similar repositories for docker-bench:
Users that are interested in docker-bench are comparing it to the libraries listed below
- CIS Kubernetes Benchmark - InSpec Profileβ299Updated 5 months ago
- kube-scan: Octarine k8s cluster risk assessment toolβ800Updated 2 years ago
- π°πΈβοΈ For those interested in running Kubernetes in highly regulated environments, particularly financial servicesβ303Updated 2 years ago
- Kubernetes Common Configuration Scoring Systemβ124Updated 2 years ago
- Security risk analysis for Kubernetes resourcesβ1,272Updated this week
- Network security testing for Kubernetes DevSecOps workflowsβ371Updated 5 months ago
- Security risk analysis for Kubernetes resourcesβ510Updated this week
- Static Analysis Library for Containersβ199Updated last year
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurationsβ¦β175Updated last year
- A set of scripts inspired by CIS Kubernetes Benchmark that checks best-practices of Kubernetes installationsβ264Updated last year
- CIS Docker Benchmark - InSpec Profileβ495Updated last year
- Container Security Workshop covering using Falco on Kubernetes.β105Updated 3 years ago
- Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmarkβ164Updated this week
- [EXPERIMENTAL] Extend osquery to report on Kubernetesβ227Updated 3 years ago
- Help building an adaptive and fine-grained pod security policyβ329Updated last year
- Notice: Postee is no longer under active development or maintenance.β210Updated this week
- Dynamic Application and API Security Testingβ190Updated last year
- Connect Falco to your ecosystemβ567Updated this week
- Attacking and Defending Kubernetes Clusters: A Guided Tourβ206Updated 3 years ago
- Kubernetes security tool for policy enforcementβ443Updated 2 years ago
- β237Updated 4 months ago
- Trivy's misconfiguration scanning engineβ218Updated this week
- An admission controller that integrates Container Image Signature Verification into a Kubernetes clusterβ445Updated this week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Regoβ341Updated last year
- Use Trivy as a plug-in vulnerability scanner in the Harbor registryβ220Updated 4 months ago
- Security configuration checks for popular cloud native applications and infrastructure.β118Updated 2 years ago
- A tool to scan Kubernetes cluster for risky permissionsβ1,342Updated last month
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.β162Updated last year
- Show who has RBAC permissions to perform actions on different resources in Kubernetesβ851Updated 6 months ago
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Securityβ180Updated 3 weeks ago