kubernetes / committee-security-response
Kubernetes Security Process and Security Committee docs
☆163Updated 2 months ago
Related projects: ⓘ
- Network security testing for Kubernetes DevSecOps workflows☆367Updated last month
- Kubernetes Common Configuration Scoring System☆125Updated 2 years ago
- A kubectl plugin which triggers a Sysdig capture☆99Updated last year
- [EXPERIMENTAL] Extend osquery to report on Kubernetes☆222Updated 3 years ago
- Help building an adaptive and fine-grained pod security policy☆330Updated 11 months ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆205Updated 3 years ago
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations…☆176Updated 10 months ago
- Container Security Workshop covering using Falco on Kubernetes.☆105Updated 3 years ago
- Kubernetes security tool for policy enforcement☆444Updated last year
- A Kubernetes Admission Controller for verifying image trust.☆330Updated last month
- Open-source components of Jetstack Secure.☆252Updated this week
- Security risk analysis for Kubernetes resources☆508Updated 9 months ago
- Automatically sync groups into Kubernetes RBAC☆239Updated 9 months ago
- The public end and logs for a Kubernetes Goose Game.☆75Updated 3 years ago
- The Kubernetes Steering Committee☆84Updated last month
- A Kubernetes operator to produce egress gateway Envoy pods and control access to them with network policies☆248Updated 4 months ago
- Links and resources for the O'Reilly Kubernetes Security book☆98Updated 3 years ago
- MagTape Policy-as-Code for Kubernetes☆145Updated 4 months ago
- Resources from my KubeCon + CloudNativeCon keynote☆50Updated 6 years ago
- Kubernetes Operator to manage Dynamic Admission Controllers using Open Policy Agent☆107Updated 5 years ago
- An Kubernetes validating admission webhook that rejects pods that use environment variables.☆156Updated 5 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Updated 5 years ago
- Security risk analysis for Kubernetes resources☆75Updated 9 months ago
- Kubernetes operator for Falco that allows developers to manage rules for detecting intruders and backdoors☆68Updated 4 years ago
- A set of scripts inspired by CIS Kubernetes Benchmark that checks best-practices of Kubernetes installations☆264Updated last year
- A hands-on walkthrough for creating an extremely insecure Kubernetes cluster and then hardening it, step by step.☆198Updated 5 years ago
- Security configuration checks for popular cloud native applications and infrastructure.☆118Updated 2 years ago
- ☆97Updated 3 years ago
- ☆38Updated 3 years ago
- k8s audit repo☆226Updated 5 years ago