cerbos
gke-policy-automation
cerbos | gke-policy-automation | |
---|---|---|
42 | 8 | |
2,530 | 508 | |
4.2% | 0.2% | |
9.6 | 6.9 | |
5 days ago | 16 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cerbos
-
How to Implement Authorization in React JS
Here, Cerbos comes into the picture.
- Open Policy Agent
-
Nuxt authorization: How to implement fine-grained access control
In this tutorial you will learn how to use Cerbos to add fine-grained access control to any Nuxt web application, simplifying authorization as a result.
-
🖌️⚙️ Innovate Like Da Vinci: Blending Art and Science in Software Development
In my work with Cerbos, I apply the lessons learned from Da Vinci to tackle authorization challenges. Our approach is to create solutions where functionality seamlessly integrates with developer experience. Constantly iterating and viewing the tools through the users' lens, helps ensure that our access control solutions are robust and dev-friendly.
-
Get started with Cerbos Hub
You may already know of our open source solution - Cerbos Policy Decision Point (PDP); a devtool which helps developers enforce access control over different parts of their software. If you need to learn more about Cerbos in general, we strongly recommend checking out the website and the docs.
- 💻 7 Open-Source DevTools That Save Time You Didn't Know to Exist ⌛🚀
-
Cerbos v0.32 released!
GitHub: https://github.com/cerbos/cerbos URL: https://cerbos.dev
-
Feedback needed: Cerbos Hub is now in public beta
Cerbos Hub is a managed service offering for the open source authorization product, Cerbos.
-
Feedback needed: Cerbos Hub is now in public beta!
Hello fellow devs! I'm with Cerbos (https://cerbos.dev/), a tool designed to manage who can do what in your software applications.
gke-policy-automation
-
Google Kubernetes clusters config checker tool
https://github.com/google/gke-policy-automation/blob/main/gk...
What's the point of requiring the control plane to be locked down to authorized networks (IP address ranges)? Isn't Google responsible for DDoS protection, enforcing authentication controls (i.e. logging in with a Google account in the right Google group), patching the control plane ASAP for any security vulnerabilities?
If you have a VPN, if you have heavy-duty network monitoring on your VPN endpoint, sure, limit it to the VPN. For the rest of us? Is every startup running GKE without heavy-duty VPN / network monitoring fundamentally insecure? That doesn't sound right to me. Security is supposed to be a spectrum, and it seems like black-and-white automated config checkers like these are more likely to provoke arguments internally ("but the tool said it's bad!!") than to help reach a nuanced understanding of why tradeoffs are made. No?
-
GKE Policy Automation: validate your cluster configurations
GKE Policy Automation is a tool and a policy library for validating Google Kubernetes Engine clusters against set of configuration best practices.
What are some alternatives?
OPA (Open Policy Agent) - Open Policy Agent (OPA) is an open source, general-purpose policy engine.
OPAL - Policy and data administration, distribution, and real-time updates on top of Policy Agents (OPA, Cedar, ...)
casbin-server - Casbin as a Service (CaaS)
policy-enforcer - Represent your rego rules programmatically.
Ory Keto - Open Source (Go) implementation of "Zanzibar: Google's Consistent, Global Authorization System". Ships gRPC, REST APIs, newSQL, and an easy and granular permission language. Supports ACL, RBAC, and other access models.
reposaur - Open source compliance tool for development platforms.
oso - Oso is a batteries-included framework for building authorization in your application.
tanka - Flexible, reusable and concise configuration for Kubernetes
opa-envoy-plugin - A plugin to enforce OPA policies with Envoy
popeye - 👀 A Kubernetes cluster resource sanitizer
sso-wall-of-shame - A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.