spotify / gcp-audit
A tool for auditing security properties of GCP projects.
☆157Updated 6 years ago
Alternatives and similar repositories for gcp-audit:
Users that are interested in gcp-audit are comparing it to the libraries listed below
- A toolbox to enforce firewall rules across multiple GCP projects.☆78Updated 8 years ago
- Google Cloud Platform Security Tool☆234Updated 5 years ago
- Kubernetes Auto Analyzer☆191Updated 5 years ago
- API that leverages Clair to scan Docker Registries and Kubernetes Clusters for vulnerabilities☆151Updated last year
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆93Updated 4 years ago
- Mittn: Security test tool runner for test automation in CI☆195Updated last year
- A number of Recipes for AWS☆194Updated 5 years ago
- drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templat…☆65Updated 8 years ago
- A framework for Static Analysis of Docker container images☆290Updated 5 years ago
- Now part of Forseti Security!☆19Updated 8 years ago
- Log aggregating, filtering, redirecting service☆60Updated 5 years ago
- INACTIVE - Security Testing Tool☆106Updated 9 years ago
- An actuary is a business professional who analyzes the financial consequences of risk.☆78Updated 7 years ago
- Build and deploy K8Guard. Run all Make commands from this repo.☆136Updated 9 months ago
- DEPRECATED — Self Service AWS IAM Policies for dev at scale☆58Updated 9 years ago
- Checks AWS CloudFormation templates for security, reliability and conformity☆43Updated 4 years ago
- Assessing compliance of a container☆240Updated 8 years ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- A high entropy string plugin for OpenStack's bandit project☆48Updated 3 years ago
- k8s audit repo☆227Updated 5 years ago
- A step by step guide for getting started with Grafeas and Kubernetes.☆189Updated 6 years ago
- AuthTables is a microservice that helps detect "Account Take Over" caused by simple credential theft. If bad actors are stealing your use…☆226Updated 7 years ago
- DEPRECATED - Propagate users from Mozilla's Person API to third party systems.☆40Updated 3 years ago
- ☆83Updated 5 years ago
- Enforce ownership and data security within AWS☆449Updated 4 years ago
- Hardening and Auditing Tool For Docker Hosts & Containers☆68Updated 9 years ago
- Example detection of compromise credentials in AWS☆122Updated 6 years ago
- ☆55Updated 7 years ago
- Use different IAM roles for each Docker container on an EC2 instance☆211Updated 6 years ago
- dockscan is security vulnerability and audit scanner for Docker installations☆219Updated 8 years ago