cyberark / conjurLinks
CyberArk Conjur automatically secures secrets used by privileged users and machine identities
☆828Updated 3 weeks ago
Alternatives and similar repositories for conjur
Users that are interested in conjur are comparing it to the libraries listed below
Sorting:
- Secure your apps by making them Secretless☆246Updated 2 months ago
- A service that analyzes docker images and scans for vulnerabilities☆1,587Updated 2 years ago
- CIS Docker Benchmark - InSpec Profile☆507Updated 2 years ago
- CIS Kubernetes Benchmark - InSpec Profile☆302Updated 9 months ago
- Artifact Metadata API☆1,540Updated 3 weeks ago
- Docker containers vulnerability scan☆856Updated 3 months ago
- Deploy-time Policy Enforcer for Kubernetes applications☆704Updated last month
- a ruggedization framework that embodies the principle "be mean to your code"☆989Updated 2 years ago
- kube-scan: Octarine k8s cluster risk assessment tool☆806Updated 2 years ago
- in-toto is a framework to protect supply chain integrity.☆929Updated last week
- The SPIFFE Project☆1,575Updated this week
- NIST Certified SCAP 1.2 toolkit☆1,511Updated this week
- Software Supply Chain Transparency Log☆965Updated last week
- A curated collection of awesome resources for the zero-trust security model.☆750Updated 2 years ago
- Tern is a software composition analysis tool and Python library that generates a Software Bill of Materials for container images and Dock…☆987Updated last year
- InSpec: Auditing and Testing Framework☆2,920Updated this week
- DevSec Linux Baseline - InSpec Profile☆811Updated 9 months ago
- A tool to scan Kubernetes cluster for risky permissions☆1,385Updated last week
- Superseded by https://github.com/aquasecurity/trivy-operator☆1,366Updated last month
- Security risk analysis for Kubernetes resources☆1,332Updated 2 weeks ago
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆634Updated last year
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆215Updated 4 months ago
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,365Updated this week
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆440Updated last year
- Kubernetes Security Training Platform - focusing on security mitigation☆949Updated 9 months ago
- Miscellaneous utilities that make it easier to make, manage, and run demos☆9Updated last month
- A set of scripts inspired by CIS Kubernetes Benchmark that checks best-practices of Kubernetes installations☆266Updated last year
- Regula checks infrastructure as code templates (Terraform, CloudFormation, k8s manifests) for AWS, Azure, Google Cloud, and Kubernetes se…☆965Updated 9 months ago
- Documenting your Threat Models with HCL☆430Updated this week
- Supply-chain Levels for Software Artifacts☆1,670Updated this week