tag-security
Security guidelines
An initiative to improve cloud native security by developing standards and best practices.
🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
2k stars
156 watching
527 forks
Language: HTML
last commit: about 1 month ago
Linked from 2 awesome lists
access-controlassessmentcloud-nativecncfsafetysecure-accesssecurity
Related projects:
Repository | Description | Stars |
---|---|---|
cncf/wg-serverless | Exploring cloud native and serverless technology intersection | 1,518 |
cncf/cnf-testbed | A testbed for cloud-native network functions on Kubernetes and OpenStack | 164 |
ic3hydra/hydra | A framework for securing smart contracts and decentralized security bounties on the Ethereum network. | 73 |
stelligent/cfn_nag | A tool to automatically scan and enforce security best practices in CloudFormation templates. | 1,260 |
deepfence/threatmapper | An application protection platform that monitors and analyzes cloud-native applications for vulnerabilities and threats. | 4,861 |
usnistgov/oscal | Provides standardized formats for representing security controls and their assessments | 683 |
trailofbits/ctf | A comprehensive guide to Capture The Flag competitions, focusing on vulnerability discovery, exploit creation, and operational tradecraft. | 1,319 |
ccob/bof.net | A .NET runtime framework for developing and executing malicious C code in a managed environment. | 682 |
juxt/bolt | An integrated security system for Clojure applications based on modular components | 120 |
sshcom/c3 | A set of AWS CDK components providing configuration to ensure compliance with security standards. | 31 |
spiffe/spiffe | A framework and standards for securely identifying and securing communications between application services | 1,498 |
ydcloudsecurity/cloud-security-guides | A comprehensive knowledge base providing cloud security resources, guidance, and tools to help build secure cloud infrastructure | 151 |
nccgroup/nccfsas | Contains publicly released information on simulated full-spectrum attacks on file systems and security protocols. | 607 |
nikosanif/angular-authentication | An Angular application demonstrating best practices for user authentication and authorization flows. | 239 |
helm/community | Documentation and resource hub for Helm users and contributors | 424 |