microsoft / Threat-Matrix-for-KubernetesLinks
Microsoft Defender for Cloud threat matrix for Kubernetes
☆25Updated 2 years ago
Alternatives and similar repositories for Threat-Matrix-for-Kubernetes
Users that are interested in Threat-Matrix-for-Kubernetes are comparing it to the libraries listed below
Sorting:
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆109Updated 7 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 10 months ago
- ☆114Updated 2 weeks ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆55Updated last year
- Kubernetes audit logging, when you don't control the control plane☆84Updated this week
- ☆88Updated 3 months ago
- SBOM Move - Automate build and transfer of SBOMs across systems☆23Updated this week
- Cloud Security Posture security policies☆31Updated 11 months ago
- OWASP Foundation Web Respository☆55Updated 2 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated 10 months ago
- The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.☆125Updated last week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- ☆56Updated this week
- vexctl is a tool to attest VEX impact statements☆45Updated 2 years ago
- ☆74Updated 3 months ago
- Slack alert bot for matching Github Audit Events☆10Updated 9 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆67Updated last year
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆102Updated 10 months ago
- OWASP Kubernetes security and compliance tool [WIP]☆106Updated 2 years ago
- A tool for preventing the installation of malicious npm and PyPI packages☆158Updated this week
- A tool to create, transform and attest VEX metadata☆152Updated this week
- Harness the security superpowers of your cloud asset inventory☆11Updated 11 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆59Updated last year
- ☆57Updated this week
- A collection of cloud security icons☆192Updated 2 years ago
- Scan GitHub Actions Workflow logs for IOCs☆15Updated last week
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆104Updated last year
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆136Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago