udica
kube-hunter
udica | kube-hunter | |
---|---|---|
4 | 10 | |
438 | 4,615 | |
0.9% | 0.5% | |
5.7 | 4.5 | |
about 1 month ago | about 1 month ago | |
Python | Python | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
udica
-
Podman, volumes and SELinux: should I use :Z or disable relabeling?
I have recently used udica to generate policies for a Jellyfin container, and it was very easy to generate container specific policies with it.
-
Locking down Docker daemon with SELinux policies
Check this out: https://github.com/containers/udica
-
Kubernetes Security Checklist 2021
The application should have a seccomp, apparmor or selinux profile according to the principles of least privileges (Udica, Oci-seccomp-bpf-hook, Go2seccomp, Security Profiles Operator)
- containers/udica: This repository contains a tool for generating SELinux security profiles for containers
kube-hunter
- Looking for Tips on Open Sourcing a kubernetes security tool
-
Implement DevSecOps to Secure your CI/CD pipeline
Use tool like Kube-hunter, Popeye and Kubescape for security weaknesses and misconfigurations in kubernetes clusters and visibility of security issues.
-
GitHub - aquasecurity/kube-hunter: Hunt for security weaknesses in Kubernetes clusters
It's even true: https://github.com/aquasecurity/kube-hunter/commit/1a91ac63daa55ffff8f3ad52795b89f937158fae
-
kube-hunter :: K8's Security
git clone https://github.com/aquasecurity/kube-hunter.git cd ./kube-hunter pip install -r requirements.txt python3 kube_hunter
-
Top 6 Kubernetes Security Tools
Here's a link to Kube-Hunter on Github
-
Introduction to Kubernetes Pentesting
kube-hunter - Hunt for security weaknesses in Kubernetes clusters
-
Container security best practices: Comprehensive guide
Other tools you can use are linux-bench, docker-bench, kube-bench, kube-hunter, kube-striker, Cloud Custodian, OVAL, and OS Query.
- 27 open-source tools that can make your Kubernetes workflow easier 🚀🥳
-
Kubernetes Security Checklist 2021
Cluster Configuration should be audited regularly (Kube-bench, Kube-hunter, Kubestriker)
What are some alternatives?
syft - CLI tool and library for generating a Software Bill of Materials from container images and filesystems
kube-bench - Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
security-profiles-operator - The Kubernetes Security Profiles Operator
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
kubesec - Security risk analysis for Kubernetes resources
falco - Cloud Native Runtime Security
cvehound - Check linux sources dump for known CVEs.
kubeaudit - kubeaudit helps you audit your Kubernetes clusters against common security controls
oci-seccomp-bpf-hook - OCI hook to trace syscalls and generate a seccomp profile