aws-samples / amazon-eks-use-sbom-to-find-container-image-with-vulnerable-softwareLinks
This repo hosts Terraform code for generating and analyzing Software Bill of Materials (SBOM) for Amazon ECR images. It helps identify Amazon EKS images with vulnerable software components using Amazon Athena.
☆16Updated last year
Alternatives and similar repositories for amazon-eks-use-sbom-to-find-container-image-with-vulnerable-software
Users that are interested in amazon-eks-use-sbom-to-find-container-image-with-vulnerable-software are comparing it to the libraries listed below
Sorting:
- Evaluate source control (GitHub) security posture☆251Updated 2 years ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆59Updated last year
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆151Updated this week
- (D)ocker(F)ile (C)onverter: CLI to convert Dockerfiles to use Chainguard Images and APKs in FROM and RUN lines etc.☆89Updated 3 weeks ago
- ☆286Updated 2 years ago
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆60Updated 2 years ago
- Style guide for Rego☆200Updated 5 months ago
- sigstore installation walkthrough, local☆62Updated last year
- A reading list for software supply-chain security.☆364Updated 2 years ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆361Updated last month
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- Automate permissions to your cloud and critical applications.☆241Updated last year
- debug IAM roles for service accounts☆65Updated last week
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆99Updated last week
- ☆139Updated 6 months ago
- Cedar for Kubernetes brings the power of Cedar to Kubernetes authorization and admission validation, showing how cluster administrators c…☆135Updated last month
- ☆78Updated 2 months ago
- Kubernetes audit logging, when you don't control the control plane☆85Updated last week
- ☆27Updated last year
- BadRobot - Operator Security Audit Tool☆223Updated last week
- A tool to create, transform and attest VEX metadata☆155Updated this week
- ☆245Updated this week
- Trust Dexter to ensure that all your images are pinned by digest for better security☆30Updated last year
- A library of example Spacelift policies☆48Updated 3 weeks ago
- An open source, cloud-native security to protect everything from build to runtime☆314Updated last week
- Get notified when actions are taken in the AWS Console.☆321Updated 7 months ago
- A library of rules for Conftest used to detect misconfigurations within Terraform configuration files☆190Updated 2 years ago
- sigstore the hard way!☆117Updated last month
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆341Updated 3 months ago
- Inspect certificate authorities in container images☆236Updated last week