rung / tutorial-gke-securityLinks
The tutorial of "Kubernetes Security for Microservices"
☆14Updated last year
Alternatives and similar repositories for tutorial-gke-security
Users that are interested in tutorial-gke-security are comparing it to the libraries listed below
Sorting:
- Trivy based vulnerability management service☆55Updated 3 months ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆44Updated 2 years ago
- Kubernetes CTF☆43Updated 4 years ago
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆49Updated 2 years ago
- Kilt is a project that defines how to inject foreign apps into containers☆13Updated last year
- GCP Secret Management Demo Tool☆13Updated 6 years ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆24Updated this week
- itacho to manage and operate envoy based service mesh.☆28Updated last year
- Validate "terraform plan" changes against a customizable ruleset☆29Updated 7 months ago
- Generate Terraform HCL files from existng GKE resources☆26Updated 6 years ago
- RISKEN is a monitoring tool for visualizing security risks.☆22Updated last week
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11Updated 5 years ago
- For training of "Exploitation Fundamentals"☆49Updated 4 years ago
- A recon tool for GCP Service Account Keys that requires no permissions☆22Updated 2 months ago
- A tool to merge tfstate files.☆21Updated 4 years ago
- This project demonstrates a series of best practices for improving the security of containerized applications deployed to Kubernetes Engi…☆95Updated 10 months ago
- An insecure container runtime implementation☆33Updated 6 years ago
- Automatically update IoC for lucky visitor scam☆26Updated 2 months ago
- Tools that shutdown GCP Instance on your schedule.☆32Updated 2 years ago
- Deep Security's APIs make it simple to integration with a variety of AWS Services☆19Updated 6 years ago
- The Dirty Pipe Vulnerability☆46Updated 3 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆21Updated this week
- A tool to investigate Route53, ELB, EC2 and Security Groups☆53Updated 2 years ago
- control-controls control controls of AWS Security Hub across all regions.☆10Updated 2 months ago
- AWS Cloudtrail event alerting lambda function. Send alerts to Slack, Email, or SNS.☆20Updated 2 years ago
- Examples to demonstrate how to use PipeCD☆32Updated this week
- Generating tf files and tfstate from existing GCP resources.☆46Updated 5 years ago
- [PoC] A socket-based tracing system for discovering network service dependencies. (renamed from transtracer)☆56Updated 2 weeks ago
- Scan your account for the use of untrusted AMIs☆21Updated last month
- Build URL of GCP Cloud Logging Logs Explorer☆16Updated 11 months ago