rung / tutorial-gke-securityLinks
The tutorial of "Kubernetes Security for Microservices"
☆14Updated 2 years ago
Alternatives and similar repositories for tutorial-gke-security
Users that are interested in tutorial-gke-security are comparing it to the libraries listed below
Sorting:
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 3 years ago
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆51Updated 2 years ago
- Kubernetes CTF☆43Updated 4 months ago
- Trivy based vulnerability management service☆58Updated 3 weeks ago
- A recon tool for GCP Service Account Keys that requires no permissions☆25Updated 9 months ago
- This project demonstrates a series of best practices for improving the security of containerized applications deployed to Kubernetes Engi…☆94Updated last year
- Deep Security's APIs make it simple to integration with a variety of AWS Services☆19Updated 6 years ago
- Take automated actions against threats and vulnerabilities.☆216Updated 2 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11Updated 5 years ago
- Kilt is a project that defines how to inject foreign apps into containers☆13Updated 2 years ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆24Updated 6 months ago
- RISKEN is a monitoring tool for visualizing security risks.☆24Updated last month
- Deadshot is a Github pull request scanner to identify sensitive data being committed to a repository☆190Updated last year
- ☆25Updated last year
- AWS Cloudtrail event alerting lambda function. Send alerts to Slack, Email, or SNS.☆20Updated 2 years ago
- Generating tf files and tfstate from existing GCP resources.☆45Updated 6 years ago
- API client for crt.sh☆40Updated 5 years ago
- Automatically update IoC for lucky visitor scam☆26Updated 9 months ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 3 years ago
- A tool to merge tfstate files.☆21Updated 4 years ago
- Validate "terraform plan" changes against a customizable ruleset☆30Updated last year
- Dockerfile Security Checker using OPA Rego policies with Conftest☆62Updated 3 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Updated 6 years ago
- a tool to audit the istio service mesh☆174Updated 4 years ago
- Exports primitive and predefined GCP IAM Roles and their permissions☆110Updated last week
- OpenCSPM Community Controls☆14Updated 4 years ago
- Tools that shutdown GCP Instance on your schedule.☆33Updated 2 years ago
- GKE CIS 1.1.0 Benchmark InSpec Profile☆27Updated 4 years ago
- Enable Falco to read audit logs from EKS☆11Updated 5 years ago
- ☆39Updated 4 years ago