spotify / gcp-audit
A tool for auditing security properties of GCP projects.
☆157Updated 6 years ago
Alternatives and similar repositories for gcp-audit:
Users that are interested in gcp-audit are comparing it to the libraries listed below
- A toolbox to enforce firewall rules across multiple GCP projects.☆78Updated 8 years ago
- Google Cloud Platform Security Tool☆234Updated 5 years ago
- Kubernetes Auto Analyzer☆191Updated 5 years ago
- API that leverages Clair to scan Docker Registries and Kubernetes Clusters for vulnerabilities☆151Updated last year
- Now part of Forseti Security!☆19Updated 8 years ago
- drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templat…☆65Updated 8 years ago
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆93Updated 4 years ago
- DEPRECATED - Propagate users from Mozilla's Person API to third party systems.☆40Updated 2 years ago
- scan s3 buckets for security issues☆85Updated 7 months ago
- Enforce ownership and data security within AWS☆448Updated 4 years ago
- A number of Recipes for AWS☆194Updated 5 years ago
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆138Updated 10 months ago
- Manage secrets with Vault inside a Kubernetes cluster☆230Updated 6 years ago
- Creating time bound IAM Conditions with ease and flair☆102Updated 5 years ago
- AuthTables is a microservice that helps detect "Account Take Over" caused by simple credential theft. If bad actors are stealing your use…☆225Updated 7 years ago
- Log aggregating, filtering, redirecting service☆60Updated 5 years ago
- A cli tool for importing and exporting AWS IAM configuration to YAML files☆242Updated 2 years ago
- Cloud Auxiliary is a python wrapper and orchestration module for interacting with cloud providers☆76Updated 2 years ago
- An actuary is a business professional who analyzes the financial consequences of risk.☆78Updated 7 years ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- k8s audit repo☆227Updated 5 years ago
- ☆82Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆67Updated 5 years ago
- Example detection of compromise credentials in AWS☆121Updated 6 years ago
- Build and deploy K8Guard. Run all Make commands from this repo.☆136Updated 8 months ago
- GCP CIS 1.1.0 Benchmark InSpec Profile☆130Updated 7 months ago
- ☆71Updated 5 years ago
- Hardening and Auditing Tool For Docker Hosts & Containers☆68Updated 9 years ago
- Send information about on-call users to other services like GitLab, LDAP, or Slack☆53Updated 10 months ago
- DEPRECATED — Self Service AWS IAM Policies for dev at scale☆58Updated 9 years ago