controlplaneio / ai-security-architectureLinks
Reference security architecture for AI applications
☆13Updated 4 months ago
Alternatives and similar repositories for ai-security-architecture
Users that are interested in ai-security-architecture are comparing it to the libraries listed below
Sorting:
- Response Engine for managing threats in your Kubernetes☆168Updated last week
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆97Updated this week
- ☆243Updated this week
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- BadRobot - Operator Security Audit Tool☆221Updated 3 weeks ago
- A utility to generate SPDX-compliant Bill of Materials manifests☆402Updated this week
- sigstore the hard way!☆115Updated last week
- Software Supply Chain Security Platform☆346Updated this week
- A collection of reusable Github Actions workflows.☆135Updated this week
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆51Updated last week
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆491Updated this week
- A CLI tool to sign and verify artifacts☆417Updated this week
- sigstore installation walkthrough, local☆62Updated last year
- Friends of in-toto! A place to record integrations and adoptions of the in-toto specification.☆18Updated this week
- Kubernetes audit logging, when you don't control the control plane☆84Updated this week
- Sigstore Policy Controller - an admission controller that can be used to enforce policy on a Kubernetes cluster based on verifiable supp…☆140Updated this week
- Inspect certificate authorities in container images☆236Updated last week
- Artifact Ratification Framework (CNCF Sandbox)☆271Updated last week
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆125Updated 2 weeks ago
- Runtime detection and response for malicious events in Kubernetes workloads☆46Updated last year
- A tool to create, transform and attest VEX metadata☆151Updated this week
- Catalogue all images of a Kubernetes cluster to multiple targets with Syft☆203Updated this week
- Supply Chain Security in Tekton Pipelines☆258Updated this week
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆109Updated 7 months ago
- Style guide for Rego☆200Updated 4 months ago
- ☆20Updated 2 months ago
- (D)ocker(F)ile (C)onverter: CLI to convert Dockerfiles to use Chainguard Images and APKs in FROM and RUN lines etc.☆82Updated 2 weeks ago
- Create Kubernetes AdmissionReview requests from Kubernetes resource manifests☆160Updated last week
- ☆23Updated 3 years ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆357Updated 2 weeks ago