A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business functions. Includes automated scoring, contextual recommendations, and evidence-based evaluation.
☆10Jun 24, 2025Updated 8 months ago
Alternatives and similar repositories for Cloud-Native-Assurance-Maturity-Model
Users that are interested in Cloud-Native-Assurance-Maturity-Model are comparing it to the libraries listed below
Sorting:
- AIM - The open-source NHI platform for AI agents. Cryptographic identity, governance, and access control.☆37Updated this week
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 11 months ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- ☆16May 15, 2024Updated last year
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Updated this week
- Example JupyterHub deployment using KeyCloak for authentication.☆12Nov 12, 2019Updated 6 years ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 3 months ago
- ☆11Dec 10, 2023Updated 2 years ago
- ☆22Mar 24, 2025Updated 11 months ago
- Reading list of more resources to learn about Adversarial Attacks on AI Systems☆34Jun 24, 2025Updated 8 months ago
- ZAP scripts to implement ASVS L1 checking☆17Apr 28, 2022Updated 3 years ago
- Explore ThalesGroup's comprehensive framework for secure machine learning systems on this repository. Developed by Thales experts, this f…☆21Feb 1, 2026Updated last month
- Run detections and view dashboards for your GCP audit logs to monitor and analyze activity across your GCP projects using Powerpipe and T…☆12Apr 9, 2025Updated 11 months ago
- ☆11Jan 24, 2026Updated last month
- SAMMY Open Source v2☆14Feb 6, 2025Updated last year
- in-toto Enhancements☆20Feb 17, 2025Updated last year
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- ☆20Jan 18, 2022Updated 4 years ago
- ☆21Jul 12, 2024Updated last year
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- 🌳 Postcss compiler as a Broccoli filter.☆30Mar 6, 2023Updated 3 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆113Jan 2, 2025Updated last year
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- Adds macros for vim mode plus☆12Dec 16, 2019Updated 6 years ago
- For Python ID X Traveloka Jakarta Spesial Kartini☆10Apr 20, 2018Updated 7 years ago
- Community curated list of System and Network policy templates for the KubeArmor and Cilium☆50Jan 5, 2026Updated 2 months ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 2 months ago
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆32Nov 24, 2025Updated 3 months ago
- https://www.tomsguide.com/ai/cursor-is-chatgpt-for-coding-now-anyone-can-make-an-app-in-minutes☆25Aug 27, 2024Updated last year
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆44Mar 9, 2026Updated last week
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated this week
- A SBOM-centric security scanner.☆20Updated this week
- OSCAL and Kyverno Policy Demo for AWS☆16Aug 16, 2023Updated 2 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- OASIS TC Open Repository: A GitHub public repository for development of a python library to transform between data-interchange formats (s…☆14Feb 10, 2022Updated 4 years ago
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆30Updated this week