lizrice / running-with-scissors
Resources from my KubeCon + CloudNativeCon keynote
☆50Updated 6 years ago
Alternatives and similar repositories for running-with-scissors:
Users that are interested in running-with-scissors are comparing it to the libraries listed below
- Links and resources for the O'Reilly Kubernetes Security book☆98Updated 4 years ago
- Container Security Workshop covering using Falco on Kubernetes.☆105Updated 3 years ago
- Kubernertes security workshop☆64Updated 5 years ago
- Getting Started With Cloud Native Security☆70Updated 4 years ago
- Kubernetes operator for Falco that allows developers to manage rules for detecting intruders and backdoors☆68Updated 4 years ago
- Help building an adaptive and fine-grained pod security policy☆329Updated last year
- Scripting and notes from KubeCon NA 2020 presentation "PKI the Wrong Way"☆33Updated 4 years ago
- A step by step guide for getting started with Grafeas and Kubernetes.☆190Updated 6 years ago
- Demos for several kubernetes security features☆63Updated 2 months ago
- Bash wrapper script for Aquasec Microscanner☆61Updated 5 years ago
- Owasp Zap chart for Kubernetes☆49Updated 3 years ago
- Security risk analysis for Kubernetes resources☆74Updated last month
- Kubernetes Common Configuration Scoring System☆124Updated 2 years ago
- RBAC in Kubernetes visualizer☆24Updated 5 years ago
- The Container Security Book—a free book for practitioners☆82Updated 4 years ago
- ☆96Updated 3 years ago
- ☆39Updated 3 years ago
- ☆19Updated 2 years ago
- Examples created for Certified Kubernetes Security Specialist (CKS) Exam☆27Updated 3 years ago
- This repository holds various scripts and templates that may be helpful for deploying and utilizing Sysdig Cloud☆83Updated 2 weeks ago
- ☆71Updated 6 years ago
- Hands-on with Vault on Kubernetes Tutorial☆79Updated 5 years ago
- A CLI tool providing you with status & configuration of a Kubernetes cluster fleet☆109Updated 5 months ago
- Cloud Native Security Hub - Security Resources☆54Updated 4 years ago
- A kubectl plugin which triggers a Sysdig capture☆100Updated last year
- Links and resources for the O'Reilly Kubernetes Security book☆42Updated 6 years ago
- ☆55Updated 7 years ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆206Updated 3 years ago
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations…☆176Updated last year
- A hands-on walkthrough for creating an extremely insecure Kubernetes cluster and then hardening it, step by step.☆199Updated 6 years ago