raesene / Cloud-Native-Security-Talks
☆21Updated this week
Related projects ⓘ
Alternatives and complementary repositories for Cloud-Native-Security-Talks
- ☆168Updated last month
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆80Updated 9 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆59Updated 8 months ago
- Supporting code and demos for KubeCon EU 2023 talk "Malicious Compliance: Reflections on Trusting Container Image Scanners"☆66Updated 11 months ago
- ☆91Updated 6 months ago
- ☆51Updated 8 months ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆70Updated last year
- ☆15Updated 4 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated last month
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆94Updated 6 months ago
- Kubernetes audit logging, when you don't control the control plane☆65Updated this week
- The security workflow engine!☆73Updated this week
- A full insecure kubernetes application for testing security tools☆54Updated this week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆126Updated 9 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆20Updated last month
- Validate the isolation posture of your container environment.☆152Updated this week
- Kubernetes Stranger Danger☆57Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆34Updated 2 months ago
- Curating Falco rules with MITRE ATT&CK Matrix☆74Updated 8 months ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated last month
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - for kind (and GKE, RKE2, AKS)☆22Updated 2 weeks ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆51Updated 11 months ago
- ☆24Updated 6 months ago
- boostsecurityio/lotp☆101Updated 7 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆27Updated last month
- ☆153Updated 2 months ago
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆61Updated last year