elastic / csp-security-policies
Cloud Security Posture security policies
☆31Updated 7 months ago
Alternatives and similar repositories for csp-security-policies:
Users that are interested in csp-security-policies are comparing it to the libraries listed below
- Kubernetes audit logging, when you don't control the control plane☆74Updated this week
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- Slack alert bot for matching Github Audit Events☆10Updated 5 months ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆58Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆82Updated 4 months ago
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆29Updated last year
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆30Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- ☆54Updated this week
- a tool to audit the istio service mesh☆173Updated 3 years ago
- This repository includes cloud security policies for IaC and live resources.☆39Updated 10 months ago
- Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specification☆66Updated 4 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- A Golang program to rotate AWS & GCP account keys☆65Updated 2 weeks ago
- Generates runbooks for GuardDuty findings☆35Updated 10 months ago
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- ☆41Updated last year
- Run individual controls or full compliance benchmarks for NSA CISA Kubernetes Hardening Guidance across all of your Kubernetes clusters u…☆31Updated 2 weeks ago
- Awesome AWS service control policies (SCPs), Resource Control Policies (RCPs), and other organizational policies☆27Updated 2 months ago
- https://breaches.cloud☆39Updated 6 months ago
- Security configuration checks for popular cloud native applications and infrastructure.☆118Updated 3 years ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆52Updated 10 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated last month
- vscode extension for tfsec☆30Updated 2 years ago
- CloudSplaining on AWS Managed Policies☆43Updated this week
- AWS SSO Reporter☆54Updated last year
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 8 months ago
- The Aqua Security Provider for Terraform allows you to declaratively define the configuration of your Aqua platform.☆37Updated last month
- ☆33Updated 2 years ago