cncf / tag-securityLinks
πCNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
β2,239Updated 2 weeks ago
Alternatives and similar repositories for tag-security
Users that are interested in tag-security are comparing it to the libraries listed below
Sorting:
- OpenClarity is an open source platform built to enhance security and observability of cloud native applications and infrastructureβ1,437Updated last week
- in-toto is a framework to protect supply chain integrity.β959Updated this week
- Security risk analysis for Kubernetes resourcesβ1,405Updated this week
- Supply-chain Levels for Software Artifactsβ1,754Updated last week
- A curated list for Awesome Kubernetes Security resourcesβ1,985Updated 2 years ago
- A tool to scan Kubernetes cluster for risky permissionsβ1,406Updated 5 months ago
- Kubernetes Security Training Platform - focusing on security mitigationβ968Updated last year
- Superseded by https://github.com/aquasecurity/trivy-operatorβ1,368Updated last week
- A Blazing fast Security Auditing tool for Kubernetesβ1,007Updated last year
- Hunt for security weaknesses in Kubernetes clustersβ4,968Updated last year
- OWASP Foundation Web Respositoryβ596Updated last month
- A service that analyzes docker images and scans for vulnerabilitiesβ1,590Updated 2 years ago
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmβ¦β763Updated 11 months ago
- A curated list of awesome Kubernetes security resourcesβ948Updated last year
- GUAC aggregates software security metadata into a high fidelity graph database.β1,418Updated last week
- π°πΈβοΈ For those interested in running Kubernetes in highly regulated environments, particularly financial servicesβ308Updated 3 years ago
- π Policy Controller for Kubernetesβ4,061Updated this week
- β547Updated last week
- β1,244Updated this week
- Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructβ¦β2,514Updated this week
- Peirates - Kubernetes Penetration Testing toolβ1,388Updated 3 months ago
- Linux Runtime Security and Forensics using eBPFβ4,263Updated this week
- kube-scan: Octarine k8s cluster risk assessment toolβ802Updated 2 years ago
- Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmarkβ7,808Updated this week
- Agile Threat Modeling Toolkitβ711Updated this week
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on pβ¦β5,288Updated this week
- The Kubernetes Security Profiles Operatorβ809Updated last week
- Threat matrix for CI/CD Pipelineβ759Updated last year
- Code signing and transparency for containers and binariesβ5,418Updated last week
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.β979Updated last month