When you create a docker container, it is automatically connected to a bridge network allowing inter-container communication (ICC). Disabling ICC doesn't block raw ethernet frames between containers, allowing unexpected data transfer over sockets.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A collection of security workshops and hands-on content for AWS security services and techniques
AWS serverless cloud security tool for parsing and alerting on CloudTrail logs using EQL.
Docker's Actuary automates security best-practices checks for Docker containers.
Generate Amazon GuardDuty findings related to real AWS resources with multiple tests available.
A detection-as-code platform for streamlining cloud security operations and responding to security incidents.
A cloud-native security platform that provides asset inventory, vulnerability management, compliance monitoring, and security posture management across multiple cloud providers.
A tool that determines what AWS API calls are logged by CloudTrail and what they are logged as, and can also be used as an attack simulation framework.
Open-source project for detecting security risks in cloud infrastructure accounts with support for AWS, Azure, GCP, OCI, and GitHub.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.