hysnsec / awesome-policy-as-code
A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.
☆188Updated last year
Alternatives and similar repositories for awesome-policy-as-code:
Users that are interested in awesome-policy-as-code are comparing it to the libraries listed below
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆137Updated 2 years ago
- ☆112Updated last month
- A curated list of resources about detecting threats and defending Kubernetes systems.☆375Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- ☆282Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 3 months ago
- A list of cloud security tools and vendors.☆153Updated 6 months ago
- Documenting your Threat Models with HCL☆425Updated 6 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆98Updated last year
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆237Updated 4 months ago
- Evaluate source control (GitHub) security posture☆249Updated 2 years ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆58Updated last year
- A library of rules for Conftest used to detect misconfigurations within Terraform configuration files☆190Updated 2 years ago
- List of vendors that do not allow IMDSv2 enforcement☆141Updated 10 months ago
- BadRobot - Operator Security Audit Tool☆218Updated this week
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆67Updated 3 years ago
- A deliberately vulnerable Kubernetes cluster☆124Updated last year
- A reading list for software supply-chain security.☆361Updated 2 years ago
- Open Cloud Security Posture Management Engine☆337Updated 3 years ago
- Threat matrix for CI/CD Pipeline☆747Updated 8 months ago
- OWASP Foundation Web Respository☆81Updated last month
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆326Updated last year
- Open source compliance tool for development platforms.☆286Updated last year
- Trivy's misconfiguration scanning engine☆218Updated last month
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆63Updated 9 months ago
- The SOCless automation framework☆138Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆181Updated 6 months ago
- Compares and analyzes GCP IAM roles.☆77Updated this week
- Security configuration checks for popular cloud native applications and infrastructure.☆118Updated 3 years ago