microsoft / Threat-Matrix-for-Kubernetes
Microsoft Defender for Cloud threat matrix for Kubernetes
☆23Updated 2 years ago
Alternatives and similar repositories for Threat-Matrix-for-Kubernetes:
Users that are interested in Threat-Matrix-for-Kubernetes are comparing it to the libraries listed below
- Security-focused Chaos Experiments for DevSecOps Teams☆24Updated last month
- Checks whether a Windows server according to security best practices as defined in the CIS Distribution-Independent Windows Benchmark☆18Updated last week
- ☆20Updated 9 months ago
- ☆15Updated 7 months ago
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- ☆74Updated 2 months ago
- Kubernetes audit logging, when you don't control the control plane☆67Updated this week
- ☆80Updated 2 months ago
- Cloud Security Posture security policies☆29Updated 5 months ago
- ☆53Updated this week
- ☆111Updated last month
- ☆14Updated 6 months ago
- ☆50Updated this week
- ☆25Updated 9 months ago
- ☆27Updated this week
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 5 months ago
- Slack alert bot for matching Github Audit Events☆10Updated 3 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated this week
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆20Updated 4 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆79Updated last month
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 4 months ago
- TACOS framework structural details☆20Updated last year
- ☆62Updated 3 weeks ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆28Updated 10 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated this week
- a tool to audit the istio service mesh☆174Updated 3 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year