hysnsec / awesome-policy-as-codeLinks
A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.
☆196Updated last year
Alternatives and similar repositories for awesome-policy-as-code
Users that are interested in awesome-policy-as-code are comparing it to the libraries listed below
Sorting:
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆58Updated last year
- Evaluate source control (GitHub) security posture☆252Updated 2 years ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆103Updated last year
- ☆120Updated 2 months ago
- GitGoat is an open source tool that was built to enable DevOps and Engineering teams to design and implement a sustainable misconfigurati…☆170Updated 7 months ago
- ☆286Updated 2 years ago
- Cloud Security Posture security policies☆31Updated 11 months ago
- Open source compliance tool for development platforms.☆288Updated last year
- OWASP Foundation Web Respository☆55Updated 2 years ago
- Documenting your Threat Models with HCL☆433Updated 2 months ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- A list of cloud security tools and vendors.☆175Updated 11 months ago
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆72Updated 3 years ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆150Updated last week
- For engineers and security teams driving fast and secure software supply chains☆83Updated 2 years ago
- Trivy's misconfiguration scanning engine☆217Updated 7 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆175Updated 9 months ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆77Updated this week
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- A collection of diagramming tools to help create DevOps/DevSecOps reference architectures☆73Updated last year
- A deliberately vulnerable Kubernetes cluster☆128Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 5 months ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- OWASP Foundation Web Respository☆97Updated 7 months ago
- A library of rules for Conftest used to detect misconfigurations within Terraform configuration files☆190Updated 2 years ago
- OWASP Kubernetes security and compliance tool [WIP]☆106Updated 2 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Identity & Access Management simplified and secure.☆259Updated 2 years ago