krol3 / container-security-checklistLinks
Checklist for container security - devsecops practices
☆1,606Updated 2 months ago
Alternatives and similar repositories for container-security-checklist
Users that are interested in container-security-checklist are comparing it to the libraries listed below
Sorting:
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆983Updated 2 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,017Updated 11 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,314Updated last year
- A curated list for Awesome Kubernetes Security resources☆1,987Updated this week
- ♾️ Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe 😎☆2,045Updated 3 months ago
- 📚 A curated list of awesome Docker security resources☆698Updated 2 weeks ago
- OWASP Foundation Web Respository☆598Updated last week
- A curated list of awesome Kubernetes security resources☆948Updated last year
- A curated list of awesome CI CD security resources☆791Updated last month
- Security Remediation Guides☆744Updated last week
- ☆421Updated 2 years ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,168Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,941Updated 6 months ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,782Updated 2 months ago
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆651Updated 6 months ago
- Threat matrix for CI/CD Pipeline☆759Updated last year
- Azure and AWS Attacks☆1,109Updated 3 years ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,363Updated last month
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,471Updated 6 months ago
- Vulnerable app with examples showing how to not use secrets☆1,373Updated last week
- Automating situational awareness for cloud penetration tests.☆2,252Updated 3 weeks ago
- ☆547Updated last week
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, wor…☆482Updated 3 years ago
- My cheatsheet notes to pentest AWS infrastructure☆695Updated 3 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,672Updated last year
- This repo has been replaced by https://www.cloudvulndb.org☆725Updated 3 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,204Updated 2 weeks ago
- Curating the best DevSecOps resources and tooling.☆1,592Updated last year
- List of all the Publicly disclosed vulnerabilities of Public Cloud Provider like Amazon Web Services (AWS), Microsoft Azure, Google Cloud…☆369Updated 2 years ago
- Kubernetes Security Training Platform - focusing on security mitigation☆968Updated last year