hysnsec / awesome-policy-as-codeLinks
A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.
☆190Updated last year
Alternatives and similar repositories for awesome-policy-as-code
Users that are interested in awesome-policy-as-code are comparing it to the libraries listed below
Sorting:
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆138Updated 2 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆101Updated last year
- ☆284Updated 2 years ago
- Evaluate source control (GitHub) security posture☆249Updated 2 years ago
- A library of rules for Conftest used to detect misconfigurations within Terraform configuration files☆191Updated 2 years ago
- Documenting your Threat Models with HCL☆427Updated this week
- A deliberately vulnerable Kubernetes cluster☆125Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 6 months ago
- Open Cloud Security Posture Management Engine☆340Updated 3 years ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆58Updated last year
- Open source compliance tool for development platforms.☆286Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆187Updated 9 months ago
- ☆117Updated last week
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- BadRobot - Operator Security Audit Tool☆220Updated 2 weeks ago
- Security configuration checks for popular cloud native applications and infrastructure.☆118Updated 3 years ago
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆241Updated 7 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 2 months ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆383Updated last year
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆349Updated last month
- A reading list for software supply-chain security.☆363Updated 2 years ago
- CLI for searching Rego policies☆105Updated 3 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆329Updated last month
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆70Updated 3 years ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated last year
- A curated list of Falco related tools, frameworks, blogs, podcasts, and articles☆201Updated 3 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Pre-commit git hooks for Open Policy Agent (OPA) and Rego development☆66Updated 3 years ago
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆205Updated 3 weeks ago
- List of vendors that do not allow IMDSv2 enforcement☆142Updated last year