controlplaneio / threat-modelling-labsLinks
Labs for Threat Modelling training delivered by ControlPlane
☆33Updated last year
Alternatives and similar repositories for threat-modelling-labs
Users that are interested in threat-modelling-labs are comparing it to the libraries listed below
Sorting:
- a tool to audit the istio service mesh☆173Updated 3 years ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- Demos for several kubernetes security features☆63Updated 7 months ago
- A deliberately vulnerable Kubernetes cluster☆128Updated last year
- Dockerfile Security Checker using OPA Rego policies with Conftest☆62Updated 3 years ago
- ☆51Updated 5 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Updated last year
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- CloudSplaining on AWS Managed Policies☆44Updated this week
- ☆102Updated 6 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 10 months ago
- docker image with useful network and container tools and SSH☆63Updated 9 months ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆210Updated 4 years ago
- Kubernetes Stranger Danger☆64Updated last month
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆103Updated last year
- Kubernetes Common Configuration Scoring System☆123Updated 3 years ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆150Updated last week
- Links and resources for the O'Reilly Kubernetes Security book☆45Updated 6 years ago
- ☆38Updated 4 years ago
- ☆57Updated this week
- OWASP Foundation Web Respository☆55Updated 2 years ago
- Container Security Workshop covering using Falco on Kubernetes.☆106Updated 4 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated this week
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Updated last year
- GKE CIS 1.1.0 Benchmark InSpec Profile☆27Updated 3 years ago
- ChaoSlingr: Introducing Security into Chaos Testing