elastic / cloudbeat
Analyzing Cloud Security Posture
☆47Updated this week
Alternatives and similar repositories for cloudbeat:
Users that are interested in cloudbeat are comparing it to the libraries listed below
- Cloud Security Posture security policies☆29Updated 6 months ago
- This repository includes cloud security policies for IaC and live resources.☆39Updated 9 months ago
- ☆51Updated this week
- Microsoft Defender for Cloud threat matrix for Kubernetes☆23Updated 2 years ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆58Updated last year
- ☆46Updated last week
- The Aqua Security Provider for Terraform allows you to declaratively define the configuration of your Aqua platform.☆36Updated last week
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆123Updated 3 weeks ago
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- Kubernetes audit logging, when you don't control the control plane☆71Updated last week
- ☆20Updated this week
- A tool to create, transform and attest VEX metadata☆133Updated last week
- Secret management by contract toolchain☆149Updated this week
- A VS Code Extension for Trivy☆123Updated last week
- Run individual controls or full compliance benchmarks for NSA CISA Kubernetes Hardening Guidance across all of your Kubernetes clusters u…☆32Updated 5 months ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆101Updated last week
- A collection of reusable Github Actions workflows.☆128Updated last week
- Archivista is a graph and storage service for in-toto attestations. Archivista enables the discovery and retrieval of attestations for so…☆80Updated this week
- Trivy's misconfiguration scanning engine☆216Updated 2 months ago
- Checks whether a Windows server according to security best practices as defined in the CIS Distribution-Independent Windows Benchmark☆19Updated this week
- Helm Charts for running CrowdStrike Falcon with Kubernetes☆82Updated last week
- Style guide for Rego☆200Updated last week
- Runtime security plug to protect user containers☆65Updated last month
- Notice: Postee is no longer under active development or maintenance.☆209Updated 2 weeks ago
- GitHub action to run Kubescape scans☆19Updated 3 months ago
- Hexa Policy Orchestrator enables you to manage all of your access policies consistently across software providers.☆101Updated 6 months ago
- Flowpipe sample mods, demonstrating common pipeline patterns and how to use the Flowpipe library mods. Run directly or use as examples fo…☆19Updated 5 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 5 months ago
- An SBOM query language and associated utilities☆54Updated last year
- Sigstore Policy Controller - an admission controller that can be used to enforce policy on a Kubernetes cluster based on verifiable supp…☆128Updated last week