lizrice / container-securityLinks
Resources for the O'Reilly Container Security book
☆110Updated 3 weeks ago
Alternatives and similar repositories for container-security
Users that are interested in container-security are comparing it to the libraries listed below
Sorting:
- Links and resources for the O'Reilly Kubernetes Security book☆45Updated 7 years ago
 - Kubernetes security and vulnerability tools and utilities.☆58Updated 4 years ago
 - Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
 - Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆222Updated 9 months ago
 - book website☆71Updated 3 years ago
 - Container Security Workshop covering using Falco on Kubernetes.☆106Updated 4 years ago
 - Demos for several kubernetes security features☆64Updated 9 months ago
 - Kubernetes Pod Security Standards implementation - https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/2579-psp-replacem…☆101Updated this week
 - Kubernetes Common Configuration Scoring System☆123Updated 3 years ago
 - sigstore the hard way!☆116Updated 2 months ago
 - Links and resources for the O'Reilly Kubernetes Security book☆100Updated 4 years ago
 - Runtime security plug to protect user containers☆66Updated 2 weeks ago
 - Attacking and Defending Kubernetes Clusters: A Guided Tour☆209Updated 4 years ago
 - Evolution process of The Falco Project☆57Updated this week
 - GitBook on the low-level details of building Docker containers.☆88Updated 3 years ago
 - Resources from my KubeCon + CloudNativeCon keynote☆53Updated 7 years ago
 - The Falco Project Community☆56Updated last week
 - Administrative tooling for Falco☆111Updated 3 weeks ago
 - All Aqua deployments options and aquactl configuration☆61Updated 3 weeks ago
 - Scripting and notes from KubeCon NA 2020 presentation "PKI the Wrong Way"☆33Updated 4 years ago
 - a tool to audit the istio service mesh☆173Updated 4 years ago
 - Kubernertes security workshop☆64Updated 6 years ago
 - Generate a variety of suspect actions that are detected by Falco rulesets☆110Updated 5 months ago
 - Use Snyk to find and fix vulnerabilities in your Kubernetes workloads☆93Updated last week
 - Checks whether a Linux server according to security best practices as defined in the CIS Distribution-Independent Linux Benchmark☆177Updated 2 weeks ago
 - Capture The Flag Challenge for eBPF Summit 2022☆19Updated 3 years ago
 - in-toto is a framework to secure the software supply chain.☆71Updated 9 months ago
 - This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆63Updated 4 years ago
 - Detect intrusions that happened in your Kubernetes cluster through audit logs using Falco☆63Updated 4 years ago
 - The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆128Updated this week