cyberark / conjurLinks
CyberArk Conjur automatically secures secrets used by privileged users and machine identities
☆860Updated 2 weeks ago
Alternatives and similar repositories for conjur
Users that are interested in conjur are comparing it to the libraries listed below
Sorting:
- CIS Docker Benchmark - InSpec Profile☆519Updated 2 years ago
- Secure your apps by making them Secretless☆354Updated last month
- CIS Kubernetes Benchmark - InSpec Profile☆307Updated last year
- A service that analyzes docker images and scans for vulnerabilities☆1,590Updated 2 years ago
- Head to https://github.com/JanssenProject/jans☆210Updated 2 years ago
- A set of scripts inspired by CIS Kubernetes Benchmark that checks best-practices of Kubernetes installations☆266Updated 2 years ago
- DevSec Linux Baseline - InSpec Profile☆824Updated last year
- Integration of Clair and Docker Registry☆504Updated last year
- NIST Certified SCAP 1.2 toolkit☆1,577Updated last week
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆221Updated 8 months ago
- kube-scan: Octarine k8s cluster risk assessment tool☆803Updated 2 years ago
- Artifact Metadata API☆1,550Updated last week
- InSpec: Auditing and Testing Framework☆3,005Updated last week
- Network security testing for Kubernetes DevSecOps workflows☆377Updated last month
- MKIT is a Managed Kubernetes Inspection Tool that validates several common security-related configuration settings of managed Kubernetes …☆401Updated 4 years ago
- Deploy-time Policy Enforcer for Kubernetes applications☆708Updated 5 months ago
- Docker containers vulnerability scan☆859Updated 7 months ago
- a ruggedization framework that embodies the principle "be mean to your code"☆994Updated 3 years ago
- Kubernetes security tool for policy enforcement☆444Updated 2 years ago
- A curated collection of awesome resources for the zero-trust security model.☆759Updated 2 years ago
- in-toto is a framework to protect supply chain integrity.☆950Updated this week
- Scan your container images for package vulnerabilities with Aqua Security☆858Updated 4 years ago
- Superseded by https://github.com/aquasecurity/trivy-operator☆1,371Updated last month
- Tern is a software composition analysis tool and Python library that generates a Software Bill of Materials for container images and Dock…☆1,003Updated last year
- a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containe…☆1,209Updated 2 years ago
- Open Cloud Security Posture Management Engine☆342Updated 3 years ago
- Wazuh - Wazuh Kubernetes☆332Updated this week
- The SPIFFE Project☆1,636Updated last month
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆237Updated last week
- CIS Distribution Independent Linux Benchmark - InSpec Profile☆154Updated last year