kubernetes / sig-security
Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security
☆180Updated 3 weeks ago
Alternatives and similar repositories for sig-security:
Users that are interested in sig-security are comparing it to the libraries listed below
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆123Updated 2 weeks ago
- BadRobot - Operator Security Audit Tool☆218Updated last week
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆341Updated last year
- KBOM - Kubernetes Bill of Materials☆311Updated 3 months ago
- Response Engine for managing threats in your Kubernetes☆147Updated this week
- The Kubernetes Security Profiles Operator☆735Updated this week
- Notice: Postee is no longer under active development or maintenance.☆210Updated this week
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations…☆175Updated last year
- A simple WebUI with latest events from Falco☆116Updated last month
- Security configuration checks for popular cloud native applications and infrastructure.☆118Updated 2 years ago
- ☆229Updated this week
- Artifact Ratification Framework (CNCF Sandbox)☆240Updated this week
- Generate a variety of suspect actions that are detected by Falco rulesets☆101Updated last week
- Community managed Helm charts for running Falco with Kubernetes☆250Updated last week
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆329Updated last year
- Kubernetes focused container assessment and context discovery tool for penetration testing☆444Updated 7 months ago
- Tool for auditing RBACs in Kubernetes☆215Updated 11 months ago
- 💰💸☁️ For those interested in running Kubernetes in highly regulated environments, particularly financial services☆303Updated 2 years ago
- Kyverno policies for security and best practices☆361Updated last week
- Create Kubernetes AdmissionReview requests from Kubernetes resource manifests☆112Updated last week
- ☆92Updated 8 months ago
- Sigstore Policy Controller - an admission controller that can be used to enforce policy on a Kubernetes cluster based on verifiable supp…☆126Updated this week
- Catalogue all images of a Kubernetes cluster to multiple targets with Syft☆198Updated this week
- Scan Kubernetes resource files , and helm charts for security configurations issues and best practices.☆207Updated last year
- 📚 The OPA Gatekeeper policy library☆657Updated this week
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- References for CKS Exam Objectives - Certified Kubernetes Security Specialist☆145Updated last year
- All Aqua deployments options and aquactl configuration☆58Updated last week
- Connect Falco to your ecosystem☆567Updated this week
- A standalone exporter for vulnerability reports and other CRs created by Trivy Operator (formerly Starboard).☆59Updated last week