pomerium / awesome-zero-trust
A curated collection of awesome resources for the zero-trust security model.
☆743Updated 2 years ago
Alternatives and similar repositories for awesome-zero-trust:
Users that are interested in awesome-zero-trust are comparing it to the libraries listed below
- BeyondCorp-inspired HTTPS/SSO Access Proxy. Secure internal services outside your VPN/perimeter network during a zero-trust transition.☆251Updated 2 years ago
- Zero trust system☆603Updated last week
- Principles to help you design and deploy a zero trust architecture☆1,671Updated last year
- Awesome list of resources related to container security☆232Updated 3 months ago
- Pomerium is an identity and context-aware access proxy.☆4,178Updated this week
- CIS Docker Benchmark - InSpec Profile☆500Updated last year
- Fast and efficient osquery management☆422Updated this week
- CIS Kubernetes Benchmark - InSpec Profile☆300Updated 7 months ago
- A service that analyzes docker images and scans for vulnerabilities☆1,588Updated 2 years ago
- Wireguard based overlay network CNI plugin for kubernetes☆515Updated last year
- A repository for using osquery for incident detection and response☆840Updated 2 years ago
- 🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.☆3,784Updated this week
- The SPIFFE Project☆1,539Updated last week
- Osquery launcher, autoupdater, and packager☆516Updated this week
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆632Updated last year
- Head to https://github.com/JanssenProject/jans☆210Updated 2 years ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆310Updated 8 months ago
- Creating a certificate authority the easy way☆590Updated last year
- in-toto is a framework to protect supply chain integrity.☆903Updated last week
- Software Supply Chain Transparency Log☆942Updated this week
- PagerDuty's Incident Response Documentation.☆1,025Updated 2 months ago
- Custom & better AppArmor profile generator for Docker containers.☆1,192Updated 4 years ago
- A cloud native Identity & Access Proxy / API (IAP) and Access Control Decision API that authenticates, authorizes, and mutates incoming H…☆3,319Updated this week
- An installable desktop variant of OWASP Threat Dragon☆594Updated 4 months ago
- CyberArk Conjur automatically secures secrets used by privileged users and machine identities☆804Updated 3 weeks ago
- Serverless Public Key Infrastructure Framework☆270Updated 2 years ago
- Deploy-time Policy Enforcer for Kubernetes applications☆703Updated last month
- Advanced Honeypot framework.☆1,243Updated last year
- uber's ssh certificate pam module☆852Updated last year
- An open source, online threat modelling tool from OWASP☆483Updated 8 months ago