Aqua Security
- Ramat-Gan, Israel
- https://aquasec.com
- @aquasecteam
- info@aquasec.com
Pinned repositories
Repositories
-
aqua-helm
Helm Charts For Installing Aqua Security Components
-
deployments
All Aqua deployments options and aquactl configuration
-
vuln-list
NVD, RedHat, Debian, Ubuntu, Alpine
-
cloudsploit
Cloud Security Posture Management (CSPM)
-
kube-bench
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
-
aqua-operator
The aqua-operator is a group of controllers that runs within a Kubernetes or Openshift cluster that provides a means to deploy and manage Aqua Security cluster and Components.
-
trivy
A Simple and Comprehensive Vulnerability Scanner for Container Images, Github Repositories and Filesystems. Suitable for CI
-
-
trivy-action
Runs Trivy as GitHub action to scan your Docker container image for vulnerabilities
-
go-dep-parser
Dependency Parser for Multiple Programming Languages
-
charts
Forked from IBM/chartsThe IBM/charts repository provides helm charts for IBM and Third Party middleware.
-
starboard
Kubernetes-native security toolkit
-
starboard-lens-extension
Lens extension for viewing Starboard security information
-
appshield
Security configuration checks for popular cloud native applications and infrastructure.
-
starboard-octant-plugin
Octant plugin for viewing Starboard security information
-
harbor-scanner-trivy
Use Trivy as a plug-in vulnerability scanner in the Harbor registry
-
postee
Integrate Aqua Security vulnerability scanning with ALM systems (JIRA, ServiceNow) and messaging systems (MS Teams, Slack and Simple Email)
-
harbor-scanner-aqua
Aqua CSP Scanner as a plug-in vulnerability scanner in the Harbor registry
-
kubectl-who-can
Show who has RBAC permissions to perform actions on different resources in Kubernetes
-
trivy-repo
deb/rpm repository for Trivy
-
docker-bench
Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark