lizrice / container-security
Resources for the O'Reilly Container Security book
☆97Updated last month
Alternatives and similar repositories for container-security:
Users that are interested in container-security are comparing it to the libraries listed below
- Links and resources for the O'Reilly Kubernetes Security book☆41Updated 6 years ago
- Cloud Native Security Hub - Security Resources☆54Updated 4 years ago
- Runtime security plug to protect user containers☆65Updated last week
- book website☆67Updated 2 years ago
- Container Security Workshop covering using Falco on Kubernetes.☆105Updated 3 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆98Updated 3 years ago
- GitBook on the low-level details of building Docker containers.☆87Updated 3 years ago
- Demos for several kubernetes security features☆63Updated last week
- Kubernetes Pod Security Standards implementation - https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/2579-psp-replacem…☆97Updated this week
- All Aqua deployments options and aquactl configuration☆58Updated this week
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆212Updated 9 months ago
- Administrative tooling for Falco☆89Updated this week
- ☆92Updated 8 months ago
- Resources from my KubeCon + CloudNativeCon keynote☆50Updated 6 years ago
- BadRobot - Operator Security Audit Tool☆216Updated this week
- sigstore the hard way!☆110Updated 8 months ago
- The Falco Project Community☆53Updated this week
- Examples created for Certified Kubernetes Security Specialist (CKS) Exam☆27Updated 3 years ago
- Kubernetes Network Policy Tutorial☆126Updated 2 months ago
- Kubernertes security workshop☆65Updated 5 years ago
- in-toto is a framework to secure the software supply chain.☆70Updated last week
- Process documentation, non-code deliverables, and miscellaneous artifacts of Kubernetes SIG Security☆178Updated 2 weeks ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆206Updated 3 years ago
- References for CKS Exam Objectives - Certified Kubernetes Security Specialist☆144Updated last year
- Use Snyk to find and fix vulnerabilities in your Kubernetes workloads☆88Updated this week
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆62Updated 3 years ago
- What to read to get up to speed with Kubernetes☆65Updated last year
- A collection of notes to assist with preparing for the Certified Kubernetes Security Specialist certification.☆65Updated 2 years ago