Cloud Security for Docker
Solutions for securing cloud infrastructure, services, and containerized environments. Task: Docker
Explore 14 curated tools and resources
RELATED TASKS
LATEST ADDITIONS
A CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems.
Tool for assessing compliance and running vulnerability scans on Docker images.
Discover and understand the Docker Layer 2 ICC Bug and its implications on inter-container communication.
gVisor is an application kernel that provides isolation for running sandboxed containers.
Create Docker container images for testing and long-term use.
A tool for pillaging Docker registries to extract image manifests and configurations.
Docker security audit tool with custom audit profiles and JSON report generation based on CIS Docker 1.6 Benchmark.
A framework to analyze container images and gather useful information.
A tool for building Open Container Initiative (OCI) container images with various functionalities.
Exploit that launches a process on the host from within a Docker container run with the --privileged flag by abusing the Linux cgroup v1 “notification on release” feature.
Weave Scope automatically generates a map of your application for troubleshooting and monitoring Docker & Kubernetes.
Docker's Actuary automates security best-practices checks for Docker containers.
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Python library for building Docker images with advanced features.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.