d2iq-archive / kubernetes-security-benchmark
A simple way to evaluate the security of your Kubernetes deployment against sets of best practices defined by various community sources
☆28Updated 4 years ago
Alternatives and similar repositories for kubernetes-security-benchmark:
Users that are interested in kubernetes-security-benchmark are comparing it to the libraries listed below
- Alcide Kubernetes Audit Log Analyzer - Alcide kAudit☆36Updated 3 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆98Updated 3 years ago
- Falco container runtime security extras (default rulesets and more)☆49Updated 5 years ago
- Cloud Native Security Hub - Security Resources☆54Updated 4 years ago
- ☆29Updated 3 years ago
- Enable Falco to read audit logs from EKS☆11Updated 4 years ago
- Container Security Workshop covering using Falco on Kubernetes.☆105Updated 3 years ago
- Coordinate deployments in Kubernetes with external platforms.☆15Updated 2 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- book website☆67Updated 2 years ago
- ☆33Updated 5 years ago
- RBAC in Kubernetes visualizer☆24Updated 5 years ago
- A Dockerfile that creates an image with known vulnerabilities.☆49Updated 2 years ago
- Kubernertes security workshop☆65Updated 5 years ago
- Aqua Enterprise scanner as a plug-in vulnerability scanner in the Harbor registry☆36Updated 3 months ago
- Falco workflow & testing infrastructure☆31Updated this week
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆22Updated last week
- OPA-Envoy-SPIRE External Authorization Example.☆47Updated 4 years ago
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- Dockerfile Security Checker using OPA Rego policies with Conftest☆59Updated 2 years ago
- ClusterIP Validating Webhook☆34Updated last year
- A PoC for native Kubernetes secrets support via AWS Secrets Manager☆21Updated 5 years ago
- Deployless Development on Kubernetes☆64Updated last week
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 5 years ago
- Owasp Zap chart for Kubernetes☆49Updated 2 years ago
- Kubernetes Security: from Image Hygiene to Network Policies☆143Updated 6 years ago
- Example of how to write OPA rules with conftest in a modular fashion for Terraform 0.12 plans.☆12Updated 5 years ago
- Kubernetes Admission Controller for Image Scanning using OPA☆50Updated last year