perlogix / cmonLinks
NIST Information Security Continuous Monitoring (ISCM) and configuration baseline data collector
☆16Updated 2 years ago
Alternatives and similar repositories for cmon
Users that are interested in cmon are comparing it to the libraries listed below
Sorting:
- Enable Falco to read audit logs from EKS☆11Updated 4 years ago
- Darkbit Cloud Security Tools☆25Updated 5 years ago
- The Container Security Book—a free book for practitioners☆82Updated 5 years ago
- Installation tool to install Kubernetes on a Linux servers☆22Updated 3 years ago
- Manages continuous scans of your infrastructure☆107Updated 3 years ago
- Inject Falco and pdig into a running kubernetes pod☆13Updated 5 years ago
- ☆34Updated 6 years ago
- System information collector☆102Updated 2 years ago
- Tool to collect system information to troubleshoot Cilium & Hubble related issues☆16Updated 4 years ago
- BeyondCorp-style federated access proxy☆50Updated 2 years ago
- Kit for building Falco drivers: kernel modules or eBPF probes☆67Updated 3 weeks ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆57Updated last year
- Kubernetes security scanner based on the open-source container vulnerability scanner Trivy.☆23Updated 5 years ago
- OPA-Envoy-SPIRE External Authorization Example.☆47Updated 5 years ago
- A data access control framework for Open Policy Agent☆37Updated last year
- ☆29Updated 10 months ago
- yum-nginx-api is a go API for uploading RPMs to yum repositories and configurations for running NGINX to serve them. It is a deployable …☆51Updated 4 years ago
- Understand OVAL results in a blink of an eye☆35Updated 3 years ago
- Identity-Aware Proxy☆21Updated 2 years ago
- A library and a tool for converting audit logs to XML and JSON☆46Updated 7 years ago
- Sidecar Injector for the CyberArk Secrets Manager Kubernetes Authenticator and Secretles☆32Updated 2 months ago
- NIST OSCAL SDK and CLI☆38Updated 5 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- ☆37Updated 5 years ago
- A lightweight workshop build on the shoulders of giants.☆18Updated 6 years ago
- Making CoreOS' Clair easily work in CI/CD pipelines☆29Updated 2 years ago
- Create a dedicated IaaS instance per Pod to mitigate container breakout (including CPU vulnerabilities depending on the instance type)☆22Updated 6 years ago
- AWS container security survey 2020☆11Updated 5 years ago
- Container Snitch checks running processes under the Docker Engine and alerts if any are found to be running as root☆77Updated 8 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆100Updated 4 years ago