From f0676dc604fc342a819c06eca3ca8a291db963f9 Mon Sep 17 00:00:00 2001 From: Peter Benjamin Date: Sun, 26 May 2019 13:13:56 -0700 Subject: [PATCH] Add descriptions --- README.md | 29 ++++++++++++++--------------- 1 file changed, 14 insertions(+), 15 deletions(-) diff --git a/README.md b/README.md index d89add3..dddb8f2 100644 --- a/README.md +++ b/README.md @@ -2,18 +2,17 @@ A curated list of awesome Kubernetes security resources. Can you dig it? -- [audit2rbac](https://github.com/liggitt/audit2rbac) -- [Falco](https://github.com/falcosecurity/falco) -- [kiam](https://github.com/uswitch/kiam) -- [kube-bench](https://github.com/aquasecurity/kube-bench) -- [kube-hunter](https://github.com/aquasecurity/kube-hunter) -- [kube-psp-advisor](https://github.com/sysdiglabs/kube-psp-advisor) -- [kube2iam](https://github.com/jtblin/kube2iam) -- [kubeaudit](https://github.com/Shopify/kubeaudit) -- [kubectl-bindrole](https://github.com/Ladicle/kubectl-bindrole) -- [kubectl-dig](https://github.com/sysdiglabs/kubectl-dig) -- [kubectl-kubesec](https://github.com/stefanprodan/kubectl-kubesec) -- [kubectl-who-can](https://github.com/aquasecurity/kubectl-who-can) -- [kubesec](https://github.com/shyiko/kubesec) -- [rakkess](https://github.com/corneliusweig/rakkess) -- [rback](https://github.com/mhausenblas/rback) +- [audit2rbac](https://github.com/liggitt/audit2rbac) - Autogenerate RBAC policies based on Kubernetes audit logs +- [Falco](https://github.com/falcosecurity/falco) - Container Native Runtime Security +- [kiam](https://github.com/uswitch/kiam) - Integrate AWS IAM with Kubernetes +- [kube-bench](https://github.com/aquasecurity/kube-bench) - Check whether Kubernetes is deployed according to security best practics +- [kube-hunter](https://github.com/aquasecurity/kube-hunter) - Hunt for security weaknesses in Kubernetes clusters +- [kube-psp-advisor](https://github.com/sysdiglabs/kube-psp-advisor) - Help building an adaptive and fine-grained pod security policy +- [kube2iam](https://github.com/jtblin/kube2iam) - Provide different AWS IAM roles for pods running on Kubernetes +- [kubeaudit](https://github.com/Shopify/kubeaudit) - Audit your Kubernetes clusters against common security controls +- [kubectl-bindrole](https://github.com/Ladicle/kubectl-bindrole) - Find Kubernetes roles bound to a specified ServiceAccount, Group or User +- [kubectl-dig](https://github.com/sysdiglabs/kubectl-dig) - Deep Kubernetes visibility from the kubectl +- [kubectl-kubesec](https://github.com/stefanprodan/kubectl-kubesec) - Scan Kubernetes pods, deployments, daemonsets and statefulsets with kubesec.io +- [kubectl-who-can](https://github.com/aquasecurity/kubectl-who-can) - Show who has permissions to in Kubernetes +- [rakkess](https://github.com/corneliusweig/rakkess) - Review access matrix for Kubernetes server resources +- [rback](https://github.com/mhausenblas/rback) - RBAC in Kubernetes visualizer