Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-container-security
Awesome list of resources related to container security
https://github.com/kai5263499/awesome-container-security
Last synced: about 15 hours ago
JSON representation
-
Presentations/Posts
-
[Container Performance Analysis](https://www.youtube.com/watch?v=bK9A5ODIgac)
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
- Evolution of Container Usage at Netflix - Also provides insight into container monitoring, logging, and security at Netflix.
-
[Capability based sandboxing](https://archive.fosdem.org/2016/schedule/event/capsicum/)
- Awesome Object Capabilities - A language-level implementation of the capability based sandboxing methodology
- Linux port of Capsicum
-
-
Image
-
[Port Authority Open Source Security Scanner for Docker](https://www.linkedin.com/pulse/port-authority-open-source-security-scanner-docker-srinivasan/)
-
[Dramatically Reducing Software Vulnerabilities](https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8151.pdf)
- NIST security content automation protocol
- Extensible Configuration Checklist Description Format (XCCDF) - Goes along with the SCAP link above for specifying a security template that containers should conform to
-
[CoreOS Clair](https://coreos.com/blog/vulnerability-analysis-for-containers.html)
- Clair: The Container Image Security Analyzer (by Joey Schorr & Quentin Machu) - Presentation about the Clair platform
- A more polished presentation of Clair at CoreOS Fest 2016
-
[Buildah](https://github.com/containers/buildah)
-
Commercial solutions
- GrSecurity - A collection of image hardening tools
- Aqua - Full lifecycle container security management platform
- Tenable - Includes [FlawCheck](https://www.theregister.com/2016/10/26/tenable_ate_flawcheck_for_devops_enhancement/)
-
[Actuary](https://github.com/diogomonica/actuary)
- drydock - Inspired by docker-bench-security with the ability to apply custom security profiles
- Docker bench security - One of the first security linting utility for Docker
-
[Anchore](https://anchore.com/enterprise/)
-
-
Build Management
-
Commercial solutions
- Docker Cloud - Continuous scanning of images along with a trust mechanism
-
-
Networking/Runtime
-
[Cilium](https://github.com/cilium/cilium)
- Cilium - Container Security and Networking Using BPF and XDP - Thomas Graf, Covalent - Presentation of Cilium by its creator
-
Commercial solutions
-
[Romana](https://romana.io/)
-
-
Security profiles
-
[Container security as explained by the three pigs](https://www.youtube.com/watch?v=giFKMsIH4b0)
-
[Falco](https://sysdig.com/opensource/falco/)
-
-
Exploits
-
[waitid](https://www.youtube.com/watch?v=IdRDFS4u2rQ)
-
[Dirty COW](https://dirtycow.ninja/)
-
Categories
Sub Categories
[Container Performance Analysis](https://www.youtube.com/watch?v=bK9A5ODIgac)
62
Commercial solutions
7
[Dirty COW](https://dirtycow.ninja/)
3
[Port Authority Open Source Security Scanner for Docker](https://www.linkedin.com/pulse/port-authority-open-source-security-scanner-docker-srinivasan/)
2
[CoreOS Clair](https://coreos.com/blog/vulnerability-analysis-for-containers.html)
2
[Container security as explained by the three pigs](https://www.youtube.com/watch?v=giFKMsIH4b0)
2
[Falco](https://sysdig.com/opensource/falco/)
2
[Actuary](https://github.com/diogomonica/actuary)
2
[Capability based sandboxing](https://archive.fosdem.org/2016/schedule/event/capsicum/)
2
[Dramatically Reducing Software Vulnerabilities](https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8151.pdf)
2
[waitid](https://www.youtube.com/watch?v=IdRDFS4u2rQ)
1
[Anchore](https://anchore.com/enterprise/)
1
[Buildah](https://github.com/containers/buildah)
1
[Cilium](https://github.com/cilium/cilium)
1
[Romana](https://romana.io/)
1