microsoft / Threat-Matrix-for-KubernetesLinks
Microsoft Defender for Cloud threat matrix for Kubernetes
☆25Updated 2 years ago
Alternatives and similar repositories for Threat-Matrix-for-Kubernetes
Users that are interested in Threat-Matrix-for-Kubernetes are comparing it to the libraries listed below
Sorting:
- ☆86Updated this week
- ☆74Updated 2 weeks ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆55Updated 11 months ago
- ☆27Updated 2 weeks ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 7 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A catalog of services that can be publicly exposed within different cloud providers.☆14Updated 9 months ago
- ☆112Updated last week
- ☆54Updated 2 weeks ago
- Kubernetes audit logging, when you don't control the control plane☆79Updated 2 weeks ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆95Updated 4 months ago
- ☆29Updated 2 weeks ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆54Updated last year
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆21Updated 7 months ago
- Cloud Security Posture security policies☆31Updated 8 months ago
- ☆178Updated last month
- Slack alert bot for matching Github Audit Events☆10Updated 6 months ago
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆29Updated last year
- ☆10Updated 3 years ago
- ☆16Updated 2 years ago
- Demo repository for running eBPF in GitHub Actions☆18Updated 2 months ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆38Updated last year
- ☆72Updated 2 weeks ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 3 months ago
- Checks whether a Windows server according to security best practices as defined in the CIS Distribution-Independent Windows Benchmark☆21Updated 2 months ago
- ☆20Updated 2 weeks ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆57Updated 3 years ago
- Harness the security superpowers of your cloud asset inventory☆11Updated 8 months ago
- An SBOM query language and associated utilities☆54Updated last year