kubernetes / sig-security
Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security
☆198Updated last week
Alternatives and similar repositories for sig-security:
Users that are interested in sig-security are comparing it to the libraries listed below
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆123Updated 3 weeks ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆343Updated last week
- Response Engine for managing threats in your Kubernetes☆152Updated this week
- KBOM - Kubernetes Bill of Materials☆313Updated last week
- Create Kubernetes AdmissionReview requests from Kubernetes resource manifests☆138Updated 2 weeks ago
- 💰💸☁ ️ For those interested in running Kubernetes in highly regulated environments, particularly financial services☆304Updated 2 years ago
- Kyverno policies for security and best practices☆372Updated last week
- BadRobot - Operator Security Audit Tool☆218Updated this week
- ☆93Updated last month
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations…☆176Updated last year
- Community managed Helm charts for running Falco with Kubernetes☆255Updated this week
- 📚 The OPA Gatekeeper policy library☆669Updated last week
- A simple WebUI with latest events from Falco☆119Updated 2 weeks ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- Runtime detection and response for malicious events in Kubernetes workloads☆43Updated last year
- OWASP Foundation Web Respository☆582Updated last year
- Kubernetes Stranger Danger☆62Updated last year
- The Kubernetes Security Profiles Operator☆748Updated this week
- Notice: Postee is no longer under active development or maintenance.☆209Updated 2 weeks ago
- Tool for auditing RBACs in Kubernetes☆216Updated last year
- Catalogue all images of a Kubernetes cluster to multiple targets with Syft☆199Updated this week
- Falco plugins registry☆90Updated this week
- Runtime security plug to protect user containers☆65Updated last month
- A curated list of Falco related tools, frameworks, blogs, podcasts, and articles☆201Updated 3 years ago
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, wor…☆474Updated 3 years ago
- ☆233Updated this week
- Kubernetes focused container assessment and context discovery tool for penetration testing☆452Updated 9 months ago
- Rego policies collection☆165Updated this week
- Scan Kubernetes resource files , and helm charts for security configurations issues and best practices.☆207Updated 2 years ago
- Connect Falco to your ecosystem☆580Updated last week