A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business functions. Includes automated scoring, contextual recommendations, and evidence-based evaluation.
☆10Jun 24, 2025Updated 10 months ago
Alternatives and similar repositories for Cloud-Native-Assurance-Maturity-Model
Users that are interested in Cloud-Native-Assurance-Maturity-Model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AIM - The open-source NHI platform for AI agents. Cryptographic identity, governance, and access control.☆42Apr 15, 2026Updated 2 weeks ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- ☆16May 15, 2024Updated last year
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Example JupyterHub deployment using KeyCloak for authentication.☆12Nov 12, 2019Updated 6 years ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 5 months ago
- ☆11Dec 10, 2023Updated 2 years ago
- ☆22Mar 24, 2025Updated last year
- Reading list of more resources to learn about Adversarial Attacks on AI Systems☆39Apr 7, 2026Updated 3 weeks ago
- ZAP scripts to implement ASVS L1 checking☆17Apr 28, 2022Updated 4 years ago
- Run detections and view dashboards for your GCP audit logs to monitor and analyze activity across your GCP projects using Powerpipe and T…☆12Mar 25, 2026Updated last month
- ☆11Apr 15, 2026Updated 2 weeks ago
- SAMMY Open Source v2☆14Feb 6, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Explore ThalesGroup's comprehensive framework for secure machine learning systems on this repository. Developed by Thales experts, this f…☆24Apr 14, 2026Updated 2 weeks ago
- in-toto Enhancements☆20Feb 17, 2025Updated last year
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- ☆20Jan 18, 2022Updated 4 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- 🌳 Postcss compiler as a Broccoli filter.☆30Mar 6, 2023Updated 3 years ago
- ☆22Jul 12, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆115Jan 2, 2025Updated last year
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 3 years ago
- This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some custo…☆75Mar 31, 2026Updated 3 weeks ago
- Adds macros for vim mode plus☆12Dec 16, 2019Updated 6 years ago
- For Python ID X Traveloka Jakarta Spesial Kartini☆10Apr 20, 2018Updated 8 years ago
- Elevation of MLsec: a threat-modeling card game for machine learning systems☆33Nov 24, 2025Updated 5 months ago
- Community curated list of System and Network policy templates for the KubeArmor and Cilium☆50Updated this week
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 3 months ago
- https://www.tomsguide.com/ai/cursor-is-chatgpt-for-coding-now-anyone-can-make-an-app-in-minutes☆25Aug 27, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆45Updated this week
- A SBOM-centric security scanner.☆21Updated this week
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated this week
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- OSCAL and Kyverno Policy Demo for AWS☆16Aug 16, 2023Updated 2 years ago
- OWASP Foundation web repository☆45Mar 9, 2026Updated last month