hardening-kubernetes / from-scratch
A hands-on walkthrough for creating an extremely insecure Kubernetes cluster and then hardening it, step by step.
☆199Updated 6 years ago
Alternatives and similar repositories for from-scratch:
Users that are interested in from-scratch are comparing it to the libraries listed below
- CIS Kubernetes Benchmark - InSpec Profile☆299Updated 6 months ago
- Network security testing for Kubernetes DevSecOps workflows☆371Updated 6 months ago
- Help building an adaptive and fine-grained pod security policy☆330Updated last year
- Kubernetes security tool for policy enforcement☆443Updated 2 years ago
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations…☆176Updated last year
- A Kubernetes Admission Controller for verifying image trust.☆332Updated this week
- Container Security Workshop covering using Falco on Kubernetes.☆105Updated 3 years ago
- Security risk analysis for Kubernetes resources☆512Updated 3 weeks ago
- k8s audit repo☆227Updated 5 years ago
- A set of scripts inspired by CIS Kubernetes Benchmark that checks best-practices of Kubernetes installations☆265Updated last year
- Hands-on with Vault on Kubernetes Tutorial☆79Updated 5 years ago
- MKIT is a Managed Kubernetes Inspection Tool that validates several common security-related configuration settings of managed Kubernetes …☆401Updated 3 years ago
- Write unit tests for your Kubernetes configurations☆308Updated 5 years ago
- Integration of Clair and Docker Registry☆505Updated last year
- A step by step guide for getting started with Grafeas and Kubernetes.☆190Updated 6 years ago
- RBAC in Kubernetes visualizer☆401Updated 4 years ago
- Kubernetes manifests templates and cheat sheets.☆97Updated 5 years ago
- Kubernetes Security Process and Security Committee docs☆167Updated last week
- A collection of good practices and tools for Kubernetes RBAC☆238Updated 2 years ago
- A kubectl plugin which triggers a Sysdig capture☆99Updated last year
- Deep kubernetes visibility from the kubectl☆385Updated last year
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆206Updated 3 years ago
- Kubernetes Security: from Image Hygiene to Network Policies☆143Updated 6 years ago
- A Kubernetes node connectivity monitoring tool☆288Updated 10 months ago
- An application that can be used to easily enable authentication flows via OIDC for a kubernetes cluster.☆411Updated 3 years ago
- The kubernetes network policy validator.☆243Updated 3 years ago
- Kubernertes security workshop☆64Updated 5 years ago
- Scan Kubernetes resource files , and helm charts for security configurations issues and best practices.☆207Updated last year
- A sample lab test environment to help in preparation of CKA certification.☆71Updated 4 years ago
- An app and container for authenticating services to @HashiCorp Vault's via the Kubernetes auth method☆205Updated 5 years ago