tag-security
Security guidelines
An initiative to improve cloud native security by developing standards and best practices.
🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
2k stars
156 watching
518 forks
Language: HTML
last commit: 12 days ago
Linked from 2 awesome lists
access-controlassessmentcloud-nativecncfsafetysecure-accesssecurity
Related projects:
Repository | Description | Stars |
---|---|---|
cncf/wg-serverless | Exploring cloud native and serverless technology intersection | 1,516 |
cncf/cnf-testbed | A testbed for cloud-native network functions on Kubernetes and OpenStack | 163 |
ic3hydra/hydra | A framework for securing smart contracts and decentralized security bounties on the Ethereum network. | 73 |
stelligent/cfn_nag | A tool to automatically scan and enforce security best practices in CloudFormation templates. | 1,260 |
deepfence/threatmapper | An application protection platform that monitors and analyzes cloud-native applications for vulnerabilities and threats. | 4,845 |
usnistgov/oscal | Provides standardized formats for representing security controls and their assessments | 674 |
trailofbits/ctf | A comprehensive guide to Capture The Flag competitions, focusing on vulnerability discovery, exploit creation, and operational tradecraft. | 1,318 |
ccob/bof.net | A .NET runtime framework for developing and executing malicious C code in a managed environment. | 678 |
juxt/bolt | An integrated security system for Clojure applications based on modular components | 123 |
sshcom/c3 | A set of AWS CDK components providing configuration to ensure compliance with security standards. | 31 |
spiffe/spiffe | Defines standards and tools for secure communication between microservices in cloud-native environments | 1,487 |
ydcloudsecurity/cloud-security-guides | A comprehensive knowledge base providing cloud security resources, guidance, and tools to help build secure cloud infrastructure | 147 |
nccgroup/nccfsas | Contains publicly released information on simulated full-spectrum attacks on file systems and security protocols. | 606 |
nikosanif/angular-authentication | An Angular application demonstrating best practices for user authentication and authorization flows. | 235 |
helm/community | Documentation and resource hub for Helm users and contributors | 421 |