elastic / cloudbeatLinks
Analyzing Cloud Security Posture
☆56Updated this week
Alternatives and similar repositories for cloudbeat
Users that are interested in cloudbeat are comparing it to the libraries listed below
Sorting:
- Cloud Security Posture security policies☆32Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- A list of cloud security tools and vendors.☆178Updated last year
- Helm Charts for running CrowdStrike Falcon with Kubernetes☆93Updated this week
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆197Updated last year
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS across all of your GCP projects usin…☆40Updated this week
- ☆56Updated 3 weeks ago
- Run individual controls or full compliance benchmarks for NSA CISA Kubernetes Hardening Guidance across all of your Kubernetes clusters u…☆31Updated 3 weeks ago
- A VS Code Extension for Trivy☆148Updated 2 weeks ago
- Generate a firewall-like report for AWS Security Groups☆14Updated 2 years ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆49Updated 2 months ago
- Identity & Access Management simplified and secure.☆259Updated 2 years ago
- Flowpipe sample mods, demonstrating common pipeline patterns and how to use the Flowpipe library mods. Run directly or use as examples fo…☆19Updated 11 months ago
- ☆152Updated this week
- Trivy's misconfiguration scanning engine☆216Updated 8 months ago
- open source, cloud-native, graph-based asset inventory☆364Updated this week
- Falco plugins registry☆103Updated last week
- ☆52Updated last week
- ☆121Updated 4 months ago
- Automate permissions to your cloud and critical applications.☆242Updated last year
- ☆114Updated last month
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆109Updated 8 months ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆177Updated 4 months ago
- A Software as a Service (SaaS) log collection framework.☆178Updated last week
- ☆139Updated 6 months ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆59Updated last year
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Automated Forensics Orchestrator for Amazon EC2 and EKS is a self-service AWS Guidance implementation that enterprise customers can deplo…☆65Updated 2 months ago
- An open source, cloud-native security to protect everything from build to runtime☆317Updated this week
- Response Engine for managing threats in your Kubernetes☆170Updated this week