Add descriptions

This commit is contained in:
Peter Benjamin 2019-05-26 13:13:56 -07:00
parent 69c1efdc0d
commit f0676dc604

View File

@ -2,18 +2,17 @@
A curated list of awesome Kubernetes security resources. Can you dig it?
- [audit2rbac](https://github.com/liggitt/audit2rbac)
- [Falco](https://github.com/falcosecurity/falco)
- [kiam](https://github.com/uswitch/kiam)
- [kube-bench](https://github.com/aquasecurity/kube-bench)
- [kube-hunter](https://github.com/aquasecurity/kube-hunter)
- [kube-psp-advisor](https://github.com/sysdiglabs/kube-psp-advisor)
- [kube2iam](https://github.com/jtblin/kube2iam)
- [kubeaudit](https://github.com/Shopify/kubeaudit)
- [kubectl-bindrole](https://github.com/Ladicle/kubectl-bindrole)
- [kubectl-dig](https://github.com/sysdiglabs/kubectl-dig)
- [kubectl-kubesec](https://github.com/stefanprodan/kubectl-kubesec)
- [kubectl-who-can](https://github.com/aquasecurity/kubectl-who-can)
- [kubesec](https://github.com/shyiko/kubesec)
- [rakkess](https://github.com/corneliusweig/rakkess)
- [rback](https://github.com/mhausenblas/rback)
- [audit2rbac](https://github.com/liggitt/audit2rbac) - Autogenerate RBAC policies based on Kubernetes audit logs
- [Falco](https://github.com/falcosecurity/falco) - Container Native Runtime Security
- [kiam](https://github.com/uswitch/kiam) - Integrate AWS IAM with Kubernetes
- [kube-bench](https://github.com/aquasecurity/kube-bench) - Check whether Kubernetes is deployed according to security best practics
- [kube-hunter](https://github.com/aquasecurity/kube-hunter) - Hunt for security weaknesses in Kubernetes clusters
- [kube-psp-advisor](https://github.com/sysdiglabs/kube-psp-advisor) - Help building an adaptive and fine-grained pod security policy
- [kube2iam](https://github.com/jtblin/kube2iam) - Provide different AWS IAM roles for pods running on Kubernetes
- [kubeaudit](https://github.com/Shopify/kubeaudit) - Audit your Kubernetes clusters against common security controls
- [kubectl-bindrole](https://github.com/Ladicle/kubectl-bindrole) - Find Kubernetes roles bound to a specified ServiceAccount, Group or User
- [kubectl-dig](https://github.com/sysdiglabs/kubectl-dig) - Deep Kubernetes visibility from the kubectl
- [kubectl-kubesec](https://github.com/stefanprodan/kubectl-kubesec) - Scan Kubernetes pods, deployments, daemonsets and statefulsets with kubesec.io
- [kubectl-who-can](https://github.com/aquasecurity/kubectl-who-can) - Show who has permissions to <verb> <resource> in Kubernetes
- [rakkess](https://github.com/corneliusweig/rakkess) - Review access matrix for Kubernetes server resources
- [rback](https://github.com/mhausenblas/rback) - RBAC in Kubernetes visualizer