elastic / cloudbeatLinks
Analyzing Cloud Security Posture
☆56Updated this week
Alternatives and similar repositories for cloudbeat
Users that are interested in cloudbeat are comparing it to the libraries listed below
Sorting:
- Cloud Security Posture security policies☆32Updated last month
- ☆59Updated last week
- A list of cloud security tools and vendors.☆180Updated last year
- Run individual controls or full compliance benchmarks for NSA CISA Kubernetes Hardening Guidance across all of your Kubernetes clusters u…☆31Updated 3 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆41Updated 2 years ago
- Helm Charts for running CrowdStrike Falcon with Kubernetes☆101Updated last week
- Notice: Postee is no longer under active development or maintenance.☆207Updated 4 months ago
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆32Updated 3 weeks ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆60Updated 2 years ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS across all of your GCP projects usin…☆40Updated 3 months ago
- ☆56Updated last week
- Kubernetes audit logging, when you don't control the control plane☆90Updated last week
- Microsoft Defender for Cloud threat matrix for Kubernetes☆30Updated 2 years ago
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆201Updated 2 years ago
- Flowpipe sample mods, demonstrating common pipeline patterns and how to use the Flowpipe library mods. Run directly or use as examples fo…☆19Updated last year
- A VS Code Extension for Trivy☆158Updated 3 weeks ago
- An open source, cloud-native security to protect everything from build to runtime☆392Updated this week
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Updated 5 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Updated last year
- Cedar for Kubernetes brings the power of Cedar to Kubernetes authorization and admission validation, showing how cluster administrators c…☆141Updated last month
- ☆124Updated 7 months ago
- Harness the security superpowers of your cloud asset inventory☆11Updated last year
- Terraform templates for CI/CD to Cloud federation and Cloud2Cloud IAM federations☆68Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆111Updated 11 months ago
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆79Updated this week
- Use SQL to instantly query Kubernetes API resources. Open source CLI. No DB required.☆57Updated 3 weeks ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆368Updated 5 months ago
- open source, cloud-native, graph-based asset inventory☆387Updated this week
- ☆93Updated last month