kubesec
oci-seccomp-bpf-hook
kubesec | oci-seccomp-bpf-hook | |
---|---|---|
3 | 2 | |
1,150 | 286 | |
1.0% | 1.0% | |
7.9 | 6.6 | |
3 days ago | 16 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kubesec
- Kubesec.io: Security risk analysis for Kubernetes resources
-
Introduction to Kubernetes Pentesting
kubesec.io - Security risk analysis for Kubernetes resources
-
Kubernetes Security Checklist 2021
Workload configuration should be audited regularly (Kics, Kubeaudit, Kubescape, Conftest, Kubesec, Checkov)
oci-seccomp-bpf-hook
-
Securing Containers with Seccomp: Part 1
I was thinking about how to solve that problem, and I thought of an idea: “What if we record the syscalls that a program makes while it’s running?” I was telling one of my co-workers about my idea, and the next day he sent me a link to a tool he found on GitHub. It turned out that some folks at Red Hat had already made a tool called oci-seccomp-bpf-hook that does exactly what I wanted!
-
Kubernetes Security Checklist 2021
The application should have a seccomp, apparmor or selinux profile according to the principles of least privileges (Udica, Oci-seccomp-bpf-hook, Go2seccomp, Security Profiles Operator)
What are some alternatives?
kube-bench - Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
grype - A vulnerability scanner for container images and filesystems
kubeaudit - kubeaudit helps you audit your Kubernetes clusters against common security controls
falco - Cloud Native Runtime Security
kubescape - Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.
hadolint - Dockerfile linter, validate inline bash, written in Haskell
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
documentation - Kata Containers version 1.x documentation (for version 2.x see https://github.com/kata-containers/kata-containers).
Kyverno - Kubernetes Native Policy Management
conftest - Write tests against structured configuration data using the Open Policy Agent Rego query language
checkov - Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.