pomerium / awesome-zero-trustView external linksLinks
A curated collection of awesome resources for the zero-trust security model.
☆767Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for awesome-zero-trust
Users that are interested in awesome-zero-trust are comparing it to the libraries listed below
Sorting:
- Zero trust system☆644Feb 8, 2026Updated last week
- Principles to help you design and deploy a zero trust architecture☆1,696Apr 25, 2023Updated 2 years ago
- BeyondCorp-inspired HTTPS/SSO Access Proxy. Secure internal services outside your VPN/perimeter network during a zero-trust transition.☆255Nov 10, 2025Updated 3 months ago
- Pomerium is an identity and context-aware access proxy.☆4,672Updated this week
- A cloud native Identity & Access Proxy / API (IAP) and Access Control Decision API that authenticates, authorizes, and mutates incoming H…☆3,522Updated this week
- 🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.☆4,129Feb 6, 2026Updated last week
- 🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywher…☆8,130Updated this week
- a traefik / nginx companion to create an identity aware proxy like beyondcorp☆29Jan 3, 2019Updated 7 years ago
- Single Packet Authorization > Port Knocking☆1,303Nov 26, 2025Updated 2 months ago
- Zero Trust Service Access☆379Dec 22, 2021Updated 4 years ago
- OpenSPA - An open and extensible Single Packet Authorization (SPA) protocol☆102Jan 25, 2023Updated 3 years ago
- A flexible control server for osquery fleets☆1,100Dec 15, 2020Updated 5 years ago
- Identity-Aware Proxy☆21Feb 25, 2023Updated 2 years ago
- Boundary enables identity-based access management for dynamic infrastructure.☆3,998Updated this week
- Cloud Native Runtime Security☆8,653Updated this week
- The easiest, and most secure way to access and protect all of your infrastructure.☆19,824Updated this week
- sso, aka S.S.Octopus, aka octoboi, is a single sign-on solution for securing internal services☆3,119Dec 5, 2025Updated 2 months ago
- A simple SSL/TLS proxy with mutual authentication for securing non-TLS services.☆2,126Updated this week
- A proof of concept Software Defined Perimeter (SDP) implementation using OpenSPA for service hiding☆58Feb 13, 2022Updated 4 years ago
- AWS CloudWatch Logs Agent written in Go with zero runtime dependencies☆12Oct 7, 2016Updated 9 years ago
- Write tests against structured configuration data using the Open Policy Agent Rego query language☆3,121Updated this week
- A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.☆13,848Updated this week
- A horizontally scalable, highly available, multi-tenant, long term Prometheus.☆5,744Feb 6, 2026Updated last week
- Osquery launcher, autoupdater, and packager☆536Updated this week
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,401Oct 16, 2025Updated 3 months ago
- Repository for BLESS, an SSH Certificate Authority that runs as a AWS Lambda function☆2,761Aug 16, 2024Updated last year
- DEPRECATED - Propagate users from Mozilla's Person API to third party systems.☆40Mar 31, 2022Updated 3 years ago
- Vulnerability Static Analysis for Containers☆10,928Updated this week
- Monzo's real-time incident response and reporting tool ⚡️☆1,555Mar 20, 2024Updated last year
- Kilo is a multi-cloud network overlay built on WireGuard and designed for Kubernetes (k8s + wg = kg)☆2,212Jun 27, 2024Updated last year
- A pretty sweet vulnerability scanner☆4,147Sep 25, 2024Updated last year
- an SSO and OAuth / OIDC login solution for Nginx using the auth_request module☆3,228Jul 25, 2025Updated 6 months ago
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆12,044Updated this week
- Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark☆7,925Feb 6, 2026Updated last week
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆31,904Updated this week
- A scalable overlay networking tool with a focus on performance, simplicity and security☆16,915Updated this week
- ☆10May 28, 2020Updated 5 years ago
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,236Jan 28, 2026Updated 2 weeks ago
- A signed hash chain implementation for zero-trust data management.☆48Dec 17, 2018Updated 7 years ago