kubernetes / committee-security-response
Kubernetes Security Process and Security Committee docs
☆173Updated last week
Alternatives and similar repositories for committee-security-response:
Users that are interested in committee-security-response are comparing it to the libraries listed below
- A Kubernetes Admission Controller for verifying image trust.☆335Updated last month
- Network security testing for Kubernetes DevSecOps workflows☆375Updated 8 months ago
- Kubernetes security tool for policy enforcement☆443Updated 2 years ago
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations…☆176Updated last year
- The Kubernetes Steering Committee☆88Updated last month
- Kubernetes Common Configuration Scoring System☆124Updated 2 years ago
- A kubectl plugin which triggers a Sysdig capture☆100Updated last year
- Automatically sync groups into Kubernetes RBAC☆241Updated last year
- Security risk analysis for Kubernetes resources☆74Updated 3 months ago
- Istio CNI to setup kubernetes pod namespaces to redirect traffic to sidecar proxy.☆139Updated 4 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆98Updated 4 years ago
- Help building an adaptive and fine-grained pod security policy☆331Updated last year
- The public end and logs for a Kubernetes Goose Game.☆75Updated 4 years ago
- Open-source components of Jetstack Secure.☆256Updated last week
- MagTape Policy-as-Code for Kubernetes☆147Updated last year
- Security risk analysis for Kubernetes resources☆511Updated 3 months ago
- Container and file artifact promotion tooling for the Kubernetes project☆149Updated last week
- A step by step guide for getting started with Grafeas and Kubernetes.☆189Updated 6 years ago
- Kubernetes Operator to manage Dynamic Admission Controllers using Open Policy Agent☆104Updated 6 years ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆206Updated 3 years ago
- A hands-on walkthrough for creating an extremely insecure Kubernetes cluster and then hardening it, step by step.☆199Updated 6 years ago
- An Kubernetes validating admission webhook that rejects pods that use environment variables.☆159Updated 6 years ago
- Container Security Workshop covering using Falco on Kubernetes.☆105Updated 4 years ago
- ⭕️Snooping on the Kubernetes OpenAPI communications☆91Updated last week
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆103Updated 5 years ago
- k8s audit repo☆227Updated 5 years ago
- Kubernetes Pod Security Standards implementation - https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/2579-psp-replacem…☆100Updated this week
- 🎟 Voucher creates attestations for Binary Authorization☆73Updated 2 weeks ago
- Getting Started With Cloud Native Security☆70Updated 4 years ago
- A Kubernetes operator to produce egress gateway Envoy pods and control access to them with network policies☆252Updated 3 months ago