krol3 / container-security-checklist
Checklist for container security - devsecops practices
β1,551Updated last year
Alternatives and similar repositories for container-security-checklist:
Users that are interested in container-security-checklist are comparing it to the libraries listed below
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.β907Updated last month
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,150Updated 4 months ago
- π A curated list of awesome Docker security resourcesβ661Updated 4 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ1,965Updated 3 months ago
- A curated list of awesome CI CD security resourcesβ540Updated 4 months ago
- OWASP Foundation Web Respositoryβ581Updated last year
- βΎοΈ Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe πβ1,906Updated 2 weeks ago
- A curated list of awesome Kubernetes security resourcesβ915Updated last year
- Security Remediation Guidesβ719Updated last month
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.β593Updated last year
- A curated list for Awesome Kubernetes Security resourcesβ1,942Updated last year
- β406Updated 2 years ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWSβ¦β1,337Updated this week
- Curating the best DevSecOps resources and tooling.β1,478Updated 7 months ago
- Threat matrix for CI/CD Pipelineβ748Updated 8 months ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.β2,024Updated 3 weeks ago
- Ultimate DevSecOps libraryβ5,954Updated 4 months ago
- List of all the Publicly disclosed vulnerabilities of Public Cloud Provider like Amazon Web Services (AWS), Microsoft Azure, Google Cloudβ¦β359Updated last year
- Kubernetes Security Training Platform - focusing on security mitigationβ943Updated 6 months ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for β¦β1,502Updated 7 months ago
- Granular, Actionable Adversary Emulation for the Cloudβ1,962Updated this week
- Azure and AWS Attacksβ1,100Updated 2 years ago
- My cheatsheet notes to pentest AWS infrastructureβ671Updated 2 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructureβ1,813Updated last month
- Automating situational awareness for cloud penetration tests.β2,059Updated 2 weeks ago
- A Blazing fast Security Auditing tool for Kubernetesβ996Updated 11 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β2,038Updated 8 months ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.β1,580Updated 4 months ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on pβ¦β4,668Updated last month
- A tool to scan Kubernetes cluster for risky permissionsβ1,364Updated 3 months ago