cyberark / conjur
CyberArk Conjur automatically secures secrets used by privileged users and machine identities
☆819Updated this week
Alternatives and similar repositories for conjur
Users that are interested in conjur are comparing it to the libraries listed below
Sorting:
- Secure your apps by making them Secretless☆245Updated last month
- CIS Kubernetes Benchmark - InSpec Profile☆301Updated 9 months ago
- CIS Docker Benchmark - InSpec Profile☆505Updated 2 years ago
- kube-scan: Octarine k8s cluster risk assessment tool☆805Updated 2 years ago
- Security risk analysis for Kubernetes resources☆1,321Updated this week
- A service that analyzes docker images and scans for vulnerabilities☆1,585Updated 2 years ago
- CLI that provides on-demand secrets access for common DevOps tools☆727Updated 2 weeks ago
- Superseded by https://github.com/aquasecurity/trivy-operator☆1,367Updated 3 weeks ago
- Kubernetes RBAC static analysis & visualisation tool☆705Updated last week
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆216Updated 3 months ago
- A tool to scan Kubernetes cluster for risky permissions☆1,379Updated 5 months ago
- Network security testing for Kubernetes DevSecOps workflows☆375Updated 8 months ago
- The SPIFFE Project☆1,569Updated last month
- A set of scripts inspired by CIS Kubernetes Benchmark that checks best-practices of Kubernetes installations☆265Updated last year
- a ruggedization framework that embodies the principle "be mean to your code"☆988Updated 2 years ago
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,180Updated this week
- NIST Certified SCAP 1.2 toolkit☆1,497Updated last week
- A curated list of OPA related tools, frameworks and articles☆815Updated last month
- Kubernetes security tool for policy enforcement☆443Updated 2 years ago
- Deploy-time Policy Enforcer for Kubernetes applications☆703Updated 3 weeks ago
- OpenClarity is an open source tool built to enhance security and observability of cloud native applications and infrastructure☆1,402Updated this week
- Artifact Metadata API☆1,537Updated last week
- threatspec - continuous threat modeling, through code☆357Updated 4 years ago
- Documenting your Threat Models with HCL☆427Updated last week
- in-toto is a framework to protect supply chain integrity.☆923Updated last week
- Miscellaneous utilities that make it easier to make, manage, and run demos☆9Updated 3 weeks ago
- Head to https://github.com/JanssenProject/jans☆210Updated 2 years ago
- Security risk analysis for Kubernetes resources☆511Updated 3 months ago
- Docker containers vulnerability scan☆855Updated 2 months ago
- An open source, online threat modelling tool from OWASP☆483Updated 10 months ago