scotty-c / kubernetes-security-workshop
Kubernertes security workshop
☆65Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for kubernetes-security-workshop
- Kubernetes Pod RBAC Breakout☆36Updated last year
- RBAC in Kubernetes visualizer☆24Updated 5 years ago
- Container Security Workshop covering using Falco on Kubernetes.☆105Updated 3 years ago
- Demos for several kubernetes security features☆63Updated 3 years ago
- Owasp Zap chart for Kubernetes☆49Updated 2 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆98Updated 3 years ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆22Updated last week
- Resources from my KubeCon + CloudNativeCon keynote☆50Updated 6 years ago
- Bash wrapper script for Aquasec Microscanner☆60Updated 4 years ago
- Alcide Kubernetes Audit Log Analyzer - Alcide kAudit☆36Updated 3 years ago
- ☆33Updated 5 years ago
- Security risk analysis for Kubernetes resources☆74Updated 11 months ago
- Falco container runtime security extras (default rulesets and more)☆49Updated 5 years ago
- A collection of RBAC recipes and tips & tricks☆43Updated 4 years ago
- The Container Security Book—a free book for practitioners☆82Updated 4 years ago
- Examples created for Certified Kubernetes Security Specialist (CKS) Exam☆27Updated 3 years ago
- ☆53Updated 4 years ago
- Cloud Native Security Hub - Security Resources☆54Updated 4 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆39Updated 6 years ago
- This repository offers a comprehensive library of security policies designed to enhance the security of Kubernetes cluster configurations…☆176Updated 11 months ago
- Kubernetes operator for Falco that allows developers to manage rules for detecting intruders and backdoors☆68Updated 4 years ago
- ☆39Updated 3 years ago
- Kubernetes manifests templates and cheat sheets.☆97Updated 5 years ago
- Getting Started With Cloud Native Security☆70Updated 4 years ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆206Updated 3 years ago
- How to use Vault to store secrets and use them in Jenkins☆103Updated 6 years ago
- docker image with useful network and container tools and SSH☆62Updated last year