arhea / docker-fips-library
A library of FIPS 140-2 compliant Docker images
☆19Updated 4 years ago
Alternatives and similar repositories for docker-fips-library:
Users that are interested in docker-fips-library are comparing it to the libraries listed below
- A meta-database collecting resources that compile lists of breaches☆18Updated 5 months ago
- ☆22Updated 2 years ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆40Updated last week
- Create Logstash events from the Okta API!☆19Updated 2 years ago
- Manage GuardDuty At Enterprise Scale☆22Updated 4 years ago
- Automatically close AWS Accounts when moved to a specific Organizational Unit, such as SuspendedOU or ToBeDeletedOU or BlackHole 😛☆14Updated 2 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆62Updated last month
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- Security Alert Decoration☆27Updated this week
- Compares and analyzes GCP IAM roles.☆77Updated last month
- Sample code for finding AWS Account ID of an S3 bucket.☆49Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 6 months ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- CloudSplaining on AWS Managed Policies☆41Updated this week
- NIST OSCAL SDK and CLI☆19Updated 9 months ago
- ☆21Updated 2 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated last year
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Updated 2 years ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆46Updated last year
- Automated determination of which AWS services run where☆20Updated this week
- Model files for undocumented AWS APIs☆13Updated 9 months ago
- Scripts to quickly fix security and compliance issues☆26Updated last year
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆111Updated 6 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆73Updated 11 months ago
- A toolset to juggle AWS roles for persistent access☆56Updated 8 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- ☆41Updated last year
- Tool for obfuscating and deobfuscating data.☆70Updated last year
- A collection of Docker and Kubernetes resources☆18Updated 2 years ago
- Automate vulnerability triage which prioritizes remediation over discovery☆16Updated this week