UBUNTU20-CIS VS amicontained

Compare UBUNTU20-CIS vs amicontained and see what are their differences.

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
UBUNTU20-CIS amicontained
2 4
172 947
5.8% 1.5%
9.0 0.0
6 days ago over 3 years ago
YAML Go
MIT License MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

UBUNTU20-CIS

Posts with mentions or reviews of UBUNTU20-CIS. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-06-06.

amicontained

Posts with mentions or reviews of amicontained. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-06-06.
  • Is there a trick to know we're in a container?
    1 project | /r/docker | 15 Jul 2022
    If you want a tool based solution to this, tools like amicontained can tell you that in a container and some information about the sandbox.
  • Ask r/kubernetes: What are you working on this week?
    4 projects | /r/kubernetes | 6 Jun 2022
    I'm looking into SECCOMP profiles as well, but so far is seems a lot of pain for little gain. This series by Paulo Gomes is my starting point. part2 part3 testing-container.
  • Container capabilities
    1 project | /r/docker | 26 Jan 2022
    If you want to check the exact syscalls and caps in a container, getting a shell and using something like amicontained https://github.com/genuinetools/amicontained is a good option.
  • Hardening Docker and Kubernetes with seccomp
    2 projects | dev.to | 15 Jan 2021
    We made a few changes here. Namely, we changed seccompProfile section where we specify RuntimeDefault type and we also changed the image to amicontained which is a container introspection tool that will tell us which syscalls are blocked, as well as some other interesting security info.

What are some alternatives?

When comparing UBUNTU20-CIS and amicontained you can also consider the following projects:

RHEL8-CIS - Ansible role for Red Hat 8 CIS Baseline

runtime - Kata Containers version 1.x runtime (for version 2.x see https://github.com/kata-containers/kata-containers).

CIS-Ubuntu-20.04-Ansible - Ansible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation

Lean and Mean Docker containers - Slim(toolkit): Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)

RHEL7-CIS - Ansible role for Red Hat 7 CIS Baseline

kubernetes-ingress - NGINX and NGINX Plus Ingress Controllers for Kubernetes

UBUNTU18-CIS - CIS Baseline Ansible Role for Ubuntu 18

labs - This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.

trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

apparmor.d - Full set of AppArmor profiles (~ 1500 profiles)

img - Standalone, daemon-less, unprivileged Dockerfile and OCI compatible container image builder.