Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security
☆233Mar 2, 2026Updated last week
Alternatives and similar repositories for sig-security
Users that are interested in sig-security are comparing it to the libraries listed below
Sorting:
- A place for policy work group related proposals and prototypes.☆65May 21, 2025Updated 9 months ago
- ☆16May 15, 2024Updated last year
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,257Dec 8, 2025Updated 3 months ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 8 months ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆350Mar 21, 2025Updated 11 months ago
- ☆35Jan 4, 2026Updated 2 months ago
- Interfaces and implementations for building Kubernetes releases.☆19Updated this week
- ☆23Mar 13, 2023Updated 2 years ago
- The Kubernetes Security Profiles Operator☆836Updated this week
- Vim Plugin for Trivy☆14Feb 20, 2024Updated 2 years ago
- Release tooling for KubeBuilder projects.☆20Jul 6, 2025Updated 8 months ago
- ☆272Updated this week
- ☆46May 12, 2025Updated 9 months ago
- A simple tool for converting Rego (OPA) rule into command.☆30Jun 1, 2022Updated 3 years ago
- Scan images for security vulnerabilities in a Kubernetes cluster using Clair and Klar☆17Jul 20, 2018Updated 7 years ago
- 📚 The OPA Gatekeeper policy library☆694Mar 2, 2026Updated last week
- Kubernetes Security Process and Security Committee docs☆176Feb 23, 2026Updated 2 weeks ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Feb 16, 2022Updated 4 years ago
- ☆17Mar 3, 2026Updated last week
- Hunt for security weaknesses in Kubernetes clusters☆5,005Mar 19, 2024Updated last year
- A walkthrough of how a Kubernetes Pod can be exploited by a hacker☆11Aug 29, 2023Updated 2 years ago
- ☆13Updated this week
- ☆12Feb 2, 2024Updated 2 years ago
- How to build your own policy engine☆14Jul 24, 2022Updated 3 years ago
- Write OAuth2 access tokens to disk☆12Feb 10, 2026Updated 3 weeks ago
- multi-cluster gateway controller, manages multi-cluster gateways based on gateway api and policy attachment☆11Dec 11, 2024Updated last year
- KubeArmor runtime security integration with Open Horizon☆13Jan 23, 2026Updated last month
- shared build and test files used by kubernetes-csi projects☆22Feb 6, 2026Updated last month
- Security risk analysis for Kubernetes resources☆1,442Feb 16, 2026Updated 3 weeks ago
- ☆25Updated this week
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchm…☆769Dec 11, 2024Updated last year
- Unified Policy as Code☆7,479Updated this week
- A configurable and flexible admission controller toolkit for Kubernetes built in Go and extensible with Go.☆13Sep 29, 2023Updated 2 years ago
- ☆16Updated this week
- Primer: a Node.js Application Hardening☆10Feb 23, 2023Updated 3 years ago
- Interactive visualizations for the Bach Doodle dataset☆17Jul 24, 2019Updated 6 years ago
- AppArmor and Seccomp profiles for Docker images☆14Dec 9, 2025Updated 3 months ago
- Bits of Terraform that you can use to do bad things in CI/CD pipelines that run Terraform☆10Nov 10, 2020Updated 5 years ago
- Privateer is a plugin-based framework for security & compliance evaluations.☆18Mar 2, 2026Updated last week