doitintl / secure-gcp-referenceLinks
Best practice example for secure and compliant Google Cloud Platform infrastructure
☆104Updated 2 years ago
Alternatives and similar repositories for secure-gcp-reference
Users that are interested in secure-gcp-reference are comparing it to the libraries listed below
Sorting:
- Take automated actions against threats and vulnerabilities.☆214Updated 2 years ago
- Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud☆346Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆106Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 6 months ago
- ☆122Updated 4 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆288Updated last year
- Security Remediation Guides☆739Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- A list of cloud security tools and vendors.☆179Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated last year
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆197Updated last year
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆80Updated 3 months ago
- Create custom auto-remediation solutions using serverless functions in the cloud.☆53Updated 2 years ago
- Postman collections for Prisma Cloud☆76Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆116Updated 3 weeks ago
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆157Updated 2 years ago
- AWS Certified Security Specialty (2020) course notes☆122Updated 5 years ago
- A deliberately vulnerable Kubernetes cluster☆129Updated last year
- GCP CSPM using Google Sheets☆37Updated 6 months ago
- GCP Auto Remediation Suite for High Risk Events☆43Updated 4 years ago
- Rapidly apply hundreds of security controls in Azure☆184Updated 5 months ago
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆72Updated 4 years ago
- GCP CIS 1.1.0 Benchmark InSpec Profile☆133Updated last week
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated 11 months ago
- ☆114Updated last month
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆78Updated this week
- Cross cloud workload identity research and workshops☆42Updated 2 months ago
- Python script for collecting and visualising Google Cloud Platform IAM permissions☆50Updated 8 years ago
- An AWS IAM policy statement parser and query tool.☆194Updated 3 months ago