Displaying 1 to 12 from 12 results

CloudQuery - Transforms your cloud infrastructure into SQL database for easy monitoring, governance and security

  •    Go

CloudQuery transforms your cloud infrastructure into queryable SQL for easy monitoring, governance and security. CloudQuery pulls, normalize, expose and monitor your cloud infrastructure and SaaS apps as SQL database. This abstracts various scattered APIs enabling you to define security, governance, cost and compliance policies with SQL. CloudQuery comes with built-in policy packs such as: AWS CIS.

Fiskalizacija API CIS 2012

  •    

Pomo?ni API za pozivanje fiskalizacijskog servisa porezne uprave(CIS). Verzija CIS servisa 1.1.2

RHEL7-CIS - Ansible role for Red Hat 7 CIS Baseline

  •    Makefile

Configure RHEL/Centos 7 machine to be CIS compliant. Level 1 and 2 findings will be corrected by default. This role will make changes to the system that could break things. This is not an auditing tool but rather a remediation tool to be used after an audit has been conducted.

kubernetes-security-benchmark - A simple way to evaluate the security of your Kubernetes deployment against sets of best practices defined by various community sources

  •    Go

This project aims to provide a simple way to evaluate the security of your Kubernetes deployment against sets of best practices defined by various community sources. The Center for Internet Security (CIS) publishes a benchmark for Kubernetes. Tests are specified against the various components of a Kubernetes deployment and as such need to be run on the machine (container, VM, or bare-metal) that the component is running on. This project enables a very flexible way to run these tests to match your deployment.




ansible_role_cis_centos - CIS Benchmark CentOS Linux

  •    

This role is still under active development. Configure a CentOS 7 system to be compliant with the v2.1.1 of the CIS CentOS Linux 7 benchmark.

terraform-aws-cloudtrail-cloudwatch-alarms - Terraform module for creating alarms for tracking important changes and occurances from cloudtrail

  •    HCL

Terraform module for creating alarms for tracking important changes and occurances from cloudtrail. This module creates a set of filter metrics and alarms based on the security best practices covered in the AWS CIS Foundations Benchmark guide.

Ubuntu1604-CIS - Ubuntu CIS Hardening Ansible Role

  •    Makefile

Configure Ubuntu 16.04 machine to be CIS compliant. Level 1 and 2 findings will be corrected by default. This role will make changes to the system that could break things. This is not an auditing tool but rather a remediation tool to be used after an audit has been conducted.

cis-aws-foundations-baseline - InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark v1

  •    Ruby

This InSpec compliance profile implement the CIS AWS Foundations Benchmark in an automated way to provide security best-practice tests in an AWS environment. InSpec is an open-source run-time framework and rule language used to specify compliance, security, and policy requirements for testing any node in your infrastructure.


canonical-kubernetes-third-party-integrations - Official repository for Canonical Kubernetes Third Party Integration Documentation

  •    

This repository contains source-code and documentation for various third-party integrations with Canonical Kubernetes (CDK). The documentation here is designed to help deployment of CDK in the field. Most of the documentation in this repository assumes you already have a Canonical Kubernetes cluster up and running. If you need the steps to deploy a cluster, they can be found here: Canonical Kubernetes Deployment Guide.

amazon-linux-cis - Bootstrap script for Amazon Linux to comply CIS Amazon Linux Benchmark v2.0.0

  •    Python

Bootstrap script for Amazon Linux to comply with CIS Amazon Linux Benchmark v2.0.0. Although the differences between Amazon Linux and Amazon Linux 2 are extensive (listed here), the majority of the changes to reach CIS compliance for Amazon Linux 2 are minor. Here's the minimum required command line needed to install the hardening on Amazon Linux 2 instances.

c3 - 𝗖𝟯 provides compliant AWS CDK components to various security standards.

  •    TypeScript

The library 𝗖𝟯 provides configuration to AWS CDK components which is compliant with CIS, GDPR and other security standards. The latest version of the library is available at master branch of the repository. All development, including new features and bug fixes, take place on the master branch using forking and pull requests as described in contribution guidelines.






We have large collection of open source products. Follow the tags from Tag Cloud >>


Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.