All Projects → developer-guy → awesome-falco

developer-guy / awesome-falco

Licence: other
A curated list of Falco related tools, frameworks, blogs, podcasts, and articles

Projects that are alternatives of or similar to awesome-falco

falco-analyze-audit-log-from-k3s-cluster
Detect intrusions that happened in your Kubernetes cluster through audit logs using Falco
Stars: ✭ 56 (-66.27%)
Mutual labels:  falco, falcosidekick
falco-the-kubernetes-response-engine-using-openfaas-functions
Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions
Stars: ✭ 23 (-86.14%)
Mutual labels:  falco, container-runtime-security
altprobe
collector for XDR and security posture service
Stars: ✭ 62 (-62.65%)
Mutual labels:  falco-security
CloudAndContainerCompromiseSimulator
Simulates a compromise in a cloud and container environment
Stars: ✭ 20 (-87.95%)
Mutual labels:  kubernetes-security
k3s-on-prem-production
Playbooks needed to set up an on-premises K3s cluster and securize it
Stars: ✭ 108 (-34.94%)
Mutual labels:  falco
client-go
Go client and SDK for Falco
Stars: ✭ 47 (-71.69%)
Mutual labels:  falco
evolution
Evolution process of The Falco Project
Stars: ✭ 37 (-77.71%)
Mutual labels:  falco
sysbox-ee
Sysbox Enterprise-Edition repository. The enterprise version of the open-source Sysbox "runc" runtime (empowers rootless containers to run workloads such as Systemd, Docker, Kubernetes, just like VMs).
Stars: ✭ 42 (-74.7%)
Mutual labels:  container-runtime-security
CKS-Exercises-Certified-Kubernetes-Security-Specialist
A set of curated exercises to help you prepare for the CKS exam
Stars: ✭ 124 (-25.3%)
Mutual labels:  falco
k0otkit
k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.
Stars: ✭ 217 (+30.72%)
Mutual labels:  kubernetes-security
falco-exporter
Prometheus Metrics Exporter for Falco output events
Stars: ✭ 84 (-49.4%)
Mutual labels:  falco
kube-microcosm
An example of a kubernetes cluster appropriate for a startup company
Stars: ✭ 61 (-63.25%)
Mutual labels:  falco
awesome-cloud-native-security
awesome resources about cloud native security 🐿
Stars: ✭ 233 (+40.36%)
Mutual labels:  kubernetes-security
awesome-kubernetes-security
A curated list of awesome Kubernetes security resources
Stars: ✭ 775 (+366.87%)
Mutual labels:  kubernetes-security
policy-server
Webhook server that evaluates WebAssembly policies to validate Kubernetes requests
Stars: ✭ 111 (-33.13%)
Mutual labels:  kubernetes-security
Falco
Cloud Native Runtime Security
Stars: ✭ 4,340 (+2514.46%)
Mutual labels:  falco
falco-talon
Falco Talon is a Response Engine for managing threats in your Kubernetes
Stars: ✭ 21 (-87.35%)
Mutual labels:  falco
Checkov
Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew.
Stars: ✭ 3,572 (+2051.81%)
Mutual labels:  kubernetes-security
Kube Bench
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
Stars: ✭ 4,359 (+2525.9%)
Mutual labels:  kubernetes-security

awesome-falco Awesome



A curated list of Falco related tools, frameworks and articles

Contents

Official projects

Repositories

Docs

  • Falco - Official Falco documentation

Blogs

  • Falco - Official blog for the Falco project
  • Sysdig Blog - Explore Sysdig resources for whitepapers, videos, webinars, case studies, and more. Embed security, compliance and monitoring into DevOps workflows.

Community Repositories

Blogs and Articles

Videos

Slides

Podcasts

Interactive Learning

IDE and Editor Integrations

Support and Community

Develop and Contribute

Learn and Connect

  • Twitter - Follow us on Twitter to get the latest news!
  • User mailing list - Discussion and help from your fellow users
  • StackOverflow - Practical questions and curated answers
  • Calendar - Subscribe to the Falco calendar, through this ics feed
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].