aquasecurity / harbor-scanner-aqua
Aqua Enterprise scanner as a plug-in vulnerability scanner in the Harbor registry
☆36Updated 3 months ago
Alternatives and similar repositories for harbor-scanner-aqua:
Users that are interested in harbor-scanner-aqua are comparing it to the libraries listed below
- Harbor Scanner Adapter for Anchore Engine and Enterprise☆37Updated last week
- Alcide Kubernetes Audit Log Analyzer - Alcide kAudit☆36Updated 3 years ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated last week
- Evolution process of The Falco Project☆48Updated this week
- Manage AppAmormor profiles for Kubernetes cluster☆40Updated last year
- Security risk analysis for Kubernetes resources☆74Updated last week
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- Owasp Zap chart for Kubernetes☆48Updated 2 years ago
- ☆29Updated 3 years ago
- Kubernetes Native, Runtime Container Image Scanning☆39Updated 2 years ago
- Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.☆21Updated 7 months ago
- ☆25Updated 8 months ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆59Updated 2 years ago
- Kubernetes Admission Controller for Image Scanning using OPA☆50Updated last year
- The aqua-operator is a group of controllers that runs within a Kubernetes or Openshift cluster that provides a means to deploy and manage…☆36Updated 2 weeks ago
- Check images in your charts for vulnerabilities☆42Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Kubernetes Common Configuration Scoring System☆124Updated 2 years ago
- Cloud Native Security Hub - Security Resources☆54Updated 4 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆98Updated 4 years ago
- ☆20Updated this week
- Trivy kubernetes library☆33Updated this week
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated last month
- Generate K8s RBAC policies based on e2e test runs☆28Updated 3 years ago
- book website☆67Updated 2 years ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 5 years ago
- Kubernetes Pod RBAC Breakout☆36Updated last year
- Falco container runtime security extras (default rulesets and more)☆49Updated 5 years ago
- RBAC in Kubernetes visualizer☆24Updated 5 years ago
- Enables scanning of docker builds in Jenkins for OS package vulnerabilities.☆35Updated last year