eminaktas / threat-hunting-at-scale-demo
Threat Hunting at Scale: Auditing Thousands of Clusters With Falco + Fluent
☆12Updated 2 years ago
Alternatives and similar repositories for threat-hunting-at-scale-demo:
Users that are interested in threat-hunting-at-scale-demo are comparing it to the libraries listed below
- ☆20Updated 10 months ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated 2 weeks ago
- ☆29Updated 2 months ago
- Falco plugins registry☆90Updated this week
- Evolution process of The Falco Project☆50Updated this week
- docker image with useful network and container tools and SSH☆62Updated 4 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 3 months ago
- Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specification☆65Updated 3 months ago
- Slack alert bot for matching Github Audit Events☆10Updated 4 months ago
- Kubernetes Native, Runtime Container Image Scanning☆39Updated 2 years ago
- ☆69Updated 2 months ago
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆37Updated 2 months ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆38Updated last year
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆46Updated 10 months ago
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆15Updated last year
- Variety of kubectl krew tools usually security focused☆32Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆52Updated last year
- Ansible role to setup Falco, behavioral security with sysdig☆41Updated 2 weeks ago
- Cloud Security Posture security policies☆29Updated 6 months ago
- ☆41Updated 2 years ago
- Kubernetes audit logging, when you don't control the control plane☆71Updated this week
- Kubernetes Pod RBAC Breakout☆37Updated last year
- ☆50Updated this week
- Demos for several kubernetes security features☆63Updated 2 months ago
- Enable Falco to read audit logs from EKS☆11Updated 4 years ago
- ☆18Updated last week
- Proof of concept that uses cosign and GitHub's in built OIDC for actions to sign container images, providing a proof that what is in the …☆14Updated 2 years ago
- Detect intrusions that happened in your Kubernetes cluster through audit logs using Falco☆63Updated 3 years ago
- ☆25Updated 10 months ago