krol3 / kubernetes-security-checklistLinks
Awesome resources about Security in Kubernetes
β43Updated 2 years ago
Alternatives and similar repositories for kubernetes-security-checklist
Users that are interested in kubernetes-security-checklist are comparing it to the libraries listed below
Sorting:
- Container π¦ Security π Best Practices Checklist π & Slidesβ68Updated 4 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use β¦β68Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Securityβ64Updated last month
- OWASP Foundation Web Respositoryβ36Updated 9 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.β171Updated 5 months ago
- A Terraform reproducer for IngressNightmareβ25Updated 2 months ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.β106Updated 6 months ago
- OWASP Kubernetes Security Testing Guideβ38Updated 9 months ago
- Jekyll Files for cloudsecwiki.comβ50Updated 3 years ago
- Curating Falco rules with MITRE ATT&CK Matrixβ81Updated last year
- Discover vulnerabilities and container image misconfiguration in production environments.β56Updated last week
- WAF bypass PoCβ48Updated last year
- β98Updated 4 months ago
- book websiteβ69Updated 3 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a β¦β40Updated 2 years ago
- OWASP Kubernetes security and compliance tool [WIP]β106Updated 2 years ago
- β249Updated 9 months ago
- β46Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)β44Updated 2 years ago
- π Visualize and explore IaC βοΈ Create and share notes in VS Code π€ Sync notes and findings in real-time with friendsβ73Updated last year
- OWASP Foundation Web Respositoryβ94Updated 5 months ago
- Curated list of security toolsβ67Updated last year
- Protect against subdomain takeoverβ92Updated last year
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, worβ¦β475Updated 3 years ago
- A deliberately vulnerable Kubernetes clusterβ126Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β81Updated last year
- Lightspin AWS IAM Vulnerability Scannerβ96Updated 4 years ago
- a tool to audit the istio service meshβ173Updated 3 years ago
- A walkthrough of security controls for a serverless architecture via a demo applicationβ11Updated 3 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where wβ¦β108Updated 7 months ago