controlplaneio / threat-modelling-labsLinks
Labs for Threat Modelling training delivered by ControlPlane
☆33Updated last year
Alternatives and similar repositories for threat-modelling-labs
Users that are interested in threat-modelling-labs are comparing it to the libraries listed below
Sorting:
- A deliberately vulnerable Kubernetes cluster☆127Updated last year
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆61Updated 3 years ago
- Demos for several kubernetes security features☆64Updated 6 months ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆52Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- Kubernetes Stranger Danger☆63Updated 3 weeks ago
- OWASP Foundation Web Respository☆55Updated 2 years ago
- ☆51Updated 5 years ago
- Container Security Workshop covering using Falco on Kubernetes.☆106Updated 4 years ago
- Kubernetes Common Configuration Scoring System☆123Updated 3 years ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 9 months ago
- CloudSplaining on AWS Managed Policies☆44Updated this week
- docker image with useful network and container tools and SSH☆63Updated 8 months ago
- Links and resources for the O'Reilly Kubernetes Security book☆45Updated 6 years ago
- workshop about cloud-native security☆71Updated 3 years ago
- Kubernetes Native, Runtime Container Image Scanning☆39Updated 3 years ago
- All Aqua deployments options and aquactl configuration☆61Updated this week
- ☆100Updated 6 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated 2 weeks ago
- book website☆70Updated 3 years ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆210Updated 3 years ago
- ☆12Updated 4 years ago
- ☆27Updated 2 months ago
- ☆56Updated last week
- ☆21Updated 2 months ago
- ☆34Updated this week
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆102Updated last year
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆68Updated 4 years ago