mirror of
https://github.com/fabacab/awesome-cybersecurity-blueteam.git
synced 2024-12-28 08:49:25 -05:00
Add container/kernel isolation tools Kata Containers and gVisor.
This commit is contained in:
parent
73549f643c
commit
d0ecbfc3bb
@ -71,9 +71,11 @@ See also [asecure.cloud/tools](https://asecure.cloud/tools/).
|
||||
|
||||
- [Checkov](https://www.checkov.io/) - Static analysis for Terraform (infrastructure as code) to help detect CIS policy violations and prevent cloud security misconfiguration.
|
||||
- [Falco](https://falco.org/) - Behavioral activity monitor designed to detect anomalous activity in containerized applications, hosts, and network packet flows by auditing the Linux kernel and enriched by runtime data such as Kubernetes metrics.
|
||||
- [Kata Containers](https://katacontainers.io/) - Secure container runtime with lightweight virtual machines that feel and perform like containers, but provide stronger workload isolation using hardware virtualization technology as a second layer of defense.
|
||||
- [Managed Kubernetes Inspection Tool (MKIT)](https://github.com/darkbitio/mkit) - Query and validate several common security-related configuration settings of managed Kubernetes cluster objects and the workloads/resources running inside the cluster.
|
||||
- [Prowler](https://github.com/toniblyx/prowler) - Tool based on AWS-CLI commands for Amazon Web Services account security assessment and hardening.
|
||||
- [Scout Suite](https://github.com/nccgroup/ScoutSuite) - Open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments.
|
||||
- [gVisor](https://github.com/google/gvisor) - Application kernel, written in Go, that implements a substantial portion of the Linux system surface to provide an isolation boundary between the application and the host kernel.
|
||||
|
||||
## Communications security (COMSEC)
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user