perlogix / cmonLinks
NIST Information Security Continuous Monitoring (ISCM) and configuration baseline data collector
☆16Updated 2 years ago
Alternatives and similar repositories for cmon
Users that are interested in cmon are comparing it to the libraries listed below
Sorting:
- The Container Security Book—a free book for practitioners☆83Updated 5 years ago
- Enable Falco to read audit logs from EKS☆11Updated 5 years ago
- Darkbit Cloud Security Tools☆25Updated 5 years ago
- Identity-Aware Proxy☆21Updated 2 years ago
- Manages continuous scans of your infrastructure☆107Updated 4 years ago
- BeyondCorp-style federated access proxy☆50Updated 2 years ago
- Simplifying Seccomp enforcement in containerized or non-containerized apps☆112Updated 5 years ago
- ☆33Updated last month
- osquery input plugin☆10Updated 7 years ago
- A data access control framework for Open Policy Agent☆37Updated last year
- Track public endpoints and connections across AWS accounts using VPC Flow Logs☆12Updated 9 years ago
- Tool to collect system information to troubleshoot Cilium & Hubble related issues☆16Updated 4 years ago
- Kit for building Falco drivers: kernel modules or eBPF probes☆69Updated this week
- A tool for getting SSH keys out of LDAP☆50Updated 3 years ago
- System information collector☆102Updated 2 years ago
- ☆37Updated 5 years ago
- Inject Falco and pdig into a running kubernetes pod☆13Updated 5 years ago
- OPA-Envoy-SPIRE External Authorization Example.☆47Updated 5 years ago
- Create a dedicated IaaS instance per Pod to mitigate container breakout (including CPU vulnerabilities depending on the instance type)☆22Updated 6 years ago
- Container Snitch checks running processes under the Docker Engine and alerts if any are found to be running as root☆77Updated 8 years ago
- A repository to store Rad Fingerprinting data.☆24Updated last year
- Making CoreOS' Clair easily work in CI/CD pipelines☆29Updated 2 years ago
- Web Application Firewall (WAF) on Kubernetes☆69Updated 4 years ago
- Shell wrapper to run a login shell with `sudo` as the current user for the purpose of audit logging☆95Updated 3 years ago
- Kubernetes security scanner based on the open-source container vulnerability scanner Trivy.☆23Updated 5 years ago
- Kernel assisted microcontainer packer☆24Updated 6 years ago
- efficient linux security monitoring☆26Updated 7 years ago
- Determine your cloud provider with a simple HTTP call☆51Updated 3 years ago
- A library and a tool for converting audit logs to XML and JSON☆46Updated 8 years ago
- Understand OVAL results in a blink of an eye☆35Updated 3 years ago