elastic / csp-security-policiesLinks
Cloud Security Posture security policies
☆32Updated last year
Alternatives and similar repositories for csp-security-policies
Users that are interested in csp-security-policies are comparing it to the libraries listed below
Sorting:
- ☆57Updated 2 weeks ago
- Slack alert bot for matching Github Audit Events☆10Updated 10 months ago
- Kubernetes audit logging, when you don't control the control plane☆85Updated this week
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆31Updated 2 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆29Updated last year
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆151Updated this week
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆59Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆109Updated 8 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated 11 months ago
- CloudSplaining on AWS Managed Policies☆44Updated last week
- Run individual controls or full compliance benchmarks for NSA CISA Kubernetes Hardening Guidance across all of your Kubernetes clusters u…☆31Updated 2 weeks ago
- ☆114Updated last month
- GKE CIS 1.1.0 Benchmark InSpec Profile☆27Updated 4 years ago
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆125Updated last week
- Exports primitive and predefined GCP IAM Roles and their permissions☆108Updated this week
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆87Updated this week
- Compares and analyzes GCP IAM roles.☆77Updated 6 months ago
- Falco plugins registry☆104Updated this week
- Helm Charts for running CrowdStrike Falcon with Kubernetes☆91Updated 3 weeks ago
- ☆121Updated 3 months ago
- Trivy's misconfiguration scanning engine☆216Updated 7 months ago
- Runtime security plug to protect user containers☆66Updated last week
- Run compliance and security controls to detect Terraform AWS resources deviating from security best practices prior to deployment using P…☆28Updated last month
- Notice: Postee is no longer under active development or maintenance.☆208Updated 3 weeks ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆77Updated 3 weeks ago
- A Golang program to rotate AWS & GCP account keys☆65Updated 4 months ago
- Use Snyk to find and fix vulnerabilities in your Kubernetes workloads☆92Updated this week