Provide IAM credentials to containers running inside a kubernetes cluster based on annotations. kube2iam is a solution that redirects the traffic that is going to the EC2 metadata API for Docker containers to a container running on each instance, makes a call to the AWS API to retrieve temporary credentials and returns these to the caller. This container will need to run with the necessary permissions to make the call to the AWS API. The solution is to redirect the traffic that is going to the EC2 metadata API for Docker containers to a container running on each instance, make a call to the AWS API to retrieve temporary credentials and return these to the caller. Other calls will be proxied to the EC2 metadata API.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
CloudTracker helps identify over-privileged IAM users and roles by analyzing CloudTrail logs.
BeyondTrust Privileged Access Management (PAM) provides comprehensive security controls for privileged accounts and users.
Abusing DNSAdmins privilege for escalation in Active Directory
A Non-Human Identity Management platform that provides discovery, security, and lifecycle management for machine identities across hybrid cloud environments.
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
A simple drop-in library for managing users, permissions, and groups in your application.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.