perlogix / cmon
NIST Information Security Continuous Monitoring (ISCM) and configuration baseline data collector
☆16Updated last year
Alternatives and similar repositories for cmon:
Users that are interested in cmon are comparing it to the libraries listed below
- Mozilla scribe host policy evaluator☆14Updated last year
- efficient linux security monitoring☆26Updated 6 years ago
- Sysdig labs☆13Updated last year
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- BeyondCorp-style federated access proxy☆48Updated last year
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- ☆33Updated 5 years ago
- Syslog to Kafka gateway☆12Updated 6 years ago
- ☆33Updated last month
- ☆11Updated 7 years ago
- BlackDuck GItHub Action☆9Updated 2 years ago
- Aqua Enterprise scanner as a plug-in vulnerability scanner in the Harbor registry☆36Updated 5 months ago
- Secure connections from K8s Pods to local daemons using FlexVolume + Unix Domain Socket☆10Updated 2 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- ☆29Updated 2 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 3 months ago
- Identity-Aware Proxy☆21Updated 2 years ago
- Enable Falco to read audit logs from EKS☆11Updated 4 years ago
- Synchronize AWS credential profiles from remote sources☆12Updated last month
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago
- Dynamic Outbound Firewall Authorizer☆22Updated 2 years ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 5 years ago
- ir2proxy is a tool to convert Contour's IngressRoute resources to HTTPProxy resources.☆12Updated 4 years ago
- automatic enumeration and maintenance of Suricata monitoring interfaces☆11Updated 5 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- INTERCEPT / Policy as Code Auditing & Compliance☆84Updated 2 months ago
- A tool to deploy on demand Gitlab CI/CD runners using the custom executor.☆12Updated 2 years ago
- SNI respecting TLS reverse proxy that supports pluggable authentication☆15Updated last year
- System information collector☆42Updated 8 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Updated 7 years ago