dev-sec / cis-docker-benchmarkLinks
CIS Docker Benchmark - InSpec Profile
☆522Updated 2 years ago
Alternatives and similar repositories for cis-docker-benchmark
Users that are interested in cis-docker-benchmark are comparing it to the libraries listed below
Sorting:
- CIS Kubernetes Benchmark - InSpec Profile☆308Updated last year
- DevSec Linux Baseline - InSpec Profile☆836Updated last month
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆221Updated 10 months ago
- CIS Distribution Independent Linux Benchmark - InSpec Profile☆155Updated last year
- Docker containers vulnerability scan☆860Updated 9 months ago
- A set of scripts inspired by CIS Kubernetes Benchmark that checks best-practices of Kubernetes installations☆266Updated 2 years ago
- Simple command line tool to check for compliance against CIS Benchmarks☆267Updated last year
- the docker for gauntlt☆87Updated 2 years ago
- A service that analyzes docker images and scans for vulnerabilities☆1,591Updated 2 years ago
- Ubuntu CIS Hardening Ansible Role☆217Updated 5 months ago
- CyberArk Conjur automatically secures secrets used by privileged users and machine identities☆875Updated 2 weeks ago
- This repository contains an Ansible Role for RHEL7 / CentOS based on the Center for Internet Security Benchmarks☆104Updated 6 years ago
- Network security testing for Kubernetes DevSecOps workflows☆379Updated 2 weeks ago
- Open Cloud Security Posture Management Engine☆342Updated 3 years ago
- Integration of Clair and Docker Registry☆505Updated 2 years ago
- Automated CIS Benchmark Compliance Remediation for RHEL 7 with Ansible☆486Updated 4 months ago
- ☆548Updated last week
- Simple command-line client to the Anchore Engine service☆113Updated last year
- Ansible role for security hardening. Mirror of code maintained at opendev.org.☆684Updated this week
- a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containe…☆1,216Updated 2 years ago
- A hands-on walkthrough for creating an extremely insecure Kubernetes cluster and then hardening it, step by step.☆200Updated 6 years ago
- Run CoreOs Clair standalone☆253Updated 10 months ago
- Getting a handle on container security☆672Updated 2 years ago
- ☆285Updated 3 years ago
- kube-scan: Octarine k8s cluster risk assessment tool☆802Updated 2 years ago
- Scan your container images for package vulnerabilities with Aqua Security☆859Updated 4 years ago
- DevSec SSH Baseline - InSpec Profile☆292Updated last year
- a ruggedization framework that embodies the principle "be mean to your code"☆994Updated 3 years ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,163Updated 3 years ago
- Application Security Automation☆527Updated 2 years ago