lizrice / container-securityLinks
Resources for the O'Reilly Container Security book
☆105Updated this week
Alternatives and similar repositories for container-security
Users that are interested in container-security are comparing it to the libraries listed below
Sorting:
- Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆45Updated 7 years ago
- Container Security Workshop covering using Falco on Kubernetes.☆106Updated 4 years ago
- Kubernetes security and vulnerability tools and utilities.☆57Updated 4 years ago
- Kubernetes Common Configuration Scoring System☆123Updated 3 years ago
- Runtime security plug to protect user containers☆66Updated this week
- Demos for several kubernetes security features☆64Updated 9 months ago
- Use Snyk to find and fix vulnerabilities in your Kubernetes workloads☆93Updated last week
- Administrative tooling for Falco☆110Updated this week
- This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)☆63Updated 4 years ago
- Kubernetes Pod Security Standards implementation - https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/2579-psp-replacem…☆101Updated 3 weeks ago
- book website☆71Updated 3 years ago
- GitBook on the low-level details of building Docker containers.☆88Updated 3 years ago
- All Aqua deployments options and aquactl configuration☆61Updated this week
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆209Updated 4 years ago
- A curated list of Falco related tools, frameworks, blogs, podcasts, and articles☆202Updated 4 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆99Updated 4 years ago
- Detect intrusions that happened in your Kubernetes cluster through audit logs using Falco☆63Updated 4 years ago
- sigstore the hard way!☆117Updated 2 months ago
- The Falco Project Community☆57Updated 4 months ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark☆221Updated 8 months ago
- Helm charts for Anchore tools and services☆51Updated this week
- A collection of cloud security icons☆193Updated 2 years ago
- Service implementation for a Kubernetes Dynamic Webhook controller for interacting with Anchore☆65Updated last week
- in-toto is a framework to secure the software supply chain.☆71Updated 9 months ago
- ☆34Updated 2 months ago
- Falco workflow & testing infrastructure☆32Updated this week
- Kubernertes security workshop☆64Updated 6 years ago
- Integrates Spiffe and Vault to have secretless authentication☆92Updated this week