krol3 / container-security-checklistLinks
Checklist for container security - devsecops practices
β1,611Updated 4 months ago
Alternatives and similar repositories for container-security-checklist
Users that are interested in container-security-checklist are comparing it to the libraries listed below
Sorting:
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.β1,006Updated last week
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,339Updated last year
- π A curated list of awesome Docker security resourcesβ704Updated last month
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ2,023Updated last year
- A curated list for Awesome Kubernetes Security resourcesβ1,986Updated last month
- A curated list of awesome CI CD security resourcesβ797Updated 3 months ago
- βΎοΈ Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe πβ2,072Updated last month
- A curated list of awesome Kubernetes security resourcesβ950Updated 2 years ago
- Security Remediation Guidesβ742Updated last month
- β422Updated 3 years ago
- OWASP Foundation Web Respositoryβ600Updated last month
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.β652Updated 7 months ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWSβ¦β1,477Updated 8 months ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.β1,804Updated 3 months ago
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, worβ¦β483Updated 4 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructureβ1,961Updated 7 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β2,177Updated last year
- Threat matrix for CI/CD Pipelineβ759Updated last year
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for β¦β1,691Updated last year
- Granular, Actionable Adversary Emulation for the Cloudβ2,223Updated this week
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.β2,467Updated last week
- Vulnerable app with examples showing how to not use secrets