regal
kics
regal | kics | |
---|---|---|
3 | 13 | |
223 | 1,904 | |
5.8% | 2.0% | |
9.5 | 9.9 | |
4 days ago | 5 days ago | |
Go | Open Policy Agent | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
regal
-
Regal v0.14.0 released
Full changelog, and downloads here!
- Regal
-
Announcing Regal the Rego linter!
Please check it out, and if you like it, star it on GitHub! ⭐️ And of course, I'd love to hear what you think!
kics
-
A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons
KICS (stands for "Keeping Infrastructure as Code Secure"): Owner/Maintainer: Checkmarx Age: First released on GitHub on November 30th, 2020 License: Apache License 2.0
-
What are the best static analysis security testing tools for Terraform and infrastructure as code?
The ones I remember being alright from a bunch of trials/PoC we did at my job were Snyk https://snyk.io/product/infrastructure-as-code-security/ and The one Gitlab Ultimate uses, https://github.com/Checkmarx/kics
-
Securing the software supply chain in the cloud
KICS – Scan for Infrastructure-as-Code vulnerabilities
- Looking for Tips on Open Sourcing a kubernetes security tool
-
Implement DevSecOps to Secure your CI/CD pipeline
Checkov, Terrascan, and Kics can be used to scan our Infrastructure code. It supports Terraform, Cloudformation, and Azure ARM resources.
-
List of most useful Terraform open-source tools
kics: https://github.com/Checkmarx/kics
Cost:
-
KICS (Keep Infrastructure as Code Secure) community meetings
Details about the meeting on this thread: https://github.com/Checkmarx/kics/discussions/5675
-
Terraform AWS 4.0 Provider migration
We have a request in KICS (Keep IaC secure, https://github.com/Checkmarx/kics) to support AWS 4.0 provider and I wondered how fast did people adopt it and did the required changes.
- Question for the Argo-Verse
What are some alternatives?
docker-security-checker - Dockerfile Security Checker using OPA Rego policies with Conftest
checkov - Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
regolibrary - The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
rego-style-guide - Style guide for Rego
terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
gatekeeper-library - 📚 The OPA Gatekeeper policy library
CheatSheetSeries - The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
opa-kafka-plugin - Open Policy Agent (OPA) plug-in for Kafka authorization
terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure. [Moved to: https://github.com/accurics/terrascan]
konstraint - A policy management tool for interacting with Gatekeeper
kubescape - Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.