security-profiles-operator
udica
security-profiles-operator | udica | |
---|---|---|
2 | 4 | |
648 | 438 | |
1.7% | 1.1% | |
9.7 | 5.7 | |
5 days ago | about 1 month ago | |
C | Python | |
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
security-profiles-operator
-
Released a new tool to apply AppArmor profiles to Kubernetes
[1] https://github.com/kubernetes-sigs/security-profiles-operator [2] https://kubernetes.slack.com/archives/C013FQNB0A2
-
Kubernetes Security Checklist 2021
The application should have a seccomp, apparmor or selinux profile according to the principles of least privileges (Udica, Oci-seccomp-bpf-hook, Go2seccomp, Security Profiles Operator)
udica
-
Podman, volumes and SELinux: should I use :Z or disable relabeling?
I have recently used udica to generate policies for a Jellyfin container, and it was very easy to generate container specific policies with it.
-
Locking down Docker daemon with SELinux policies
Check this out: https://github.com/containers/udica
-
Kubernetes Security Checklist 2021
The application should have a seccomp, apparmor or selinux profile according to the principles of least privileges (Udica, Oci-seccomp-bpf-hook, Go2seccomp, Security Profiles Operator)
- containers/udica: This repository contains a tool for generating SELinux security profiles for containers
What are some alternatives?
grype - A vulnerability scanner for container images and filesystems
syft - CLI tool and library for generating a Software Bill of Materials from container images and filesystems
Kyverno - Kubernetes Native Policy Management
kubesec - Security risk analysis for Kubernetes resources
inspektor-gadget - The eBPF tool and systems inspection framework for Kubernetes, containers and Linux hosts.
cvehound - Check linux sources dump for known CVEs.
krane - Kubernetes RBAC static analysis & visualisation tool
kube-bench - Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
kubescape - Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.
oci-seccomp-bpf-hook - OCI hook to trace syscalls and generate a seccomp profile
checkov - Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.