Skip to content

Latest commit

 

History

History
39 lines (29 loc) · 2.86 KB

SecurityModel.md

File metadata and controls

39 lines (29 loc) · 2.86 KB

A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all. A computer security model is implemented through a computer security policy. https://en.wikipedia.org/wiki/Computer_security_model

Red Hat OpenShift on AWS Reference Architecture

VPC, Security Groups, IAM and more in the reference architecture. https://access.redhat.com/documentation/en-us/reference_architectures/2017/html/deploying_openshift_container_platform_3.5_on_amazon_web_services/index

Ten layers of container security

Containers make it easy to ensure consistency across environments and multiple deployment targets like physical servers, virtual machines, and private or public clouds. But, enterprises require strong security. This paper describes 10 key elements of security for different layers of the container solution stack and different stages of the container life cycle and how OpenShift delivers those ten elements of container security. https://www.redhat.com/en/resources/container-security-openshift-cloud-devops-whitepaper

Threat Modeling Toolkit

https://appseccalifornia2018.sched.com/event/CuRh/threat-modeling-toolkit?iframe=no&w=100%&sidebar=yes&bg=no

Arachni

is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of modern web applications. http://www.arachni-scanner.com/

Red Hat Ansible

for Security Automation https://www.ansible.com/blog/security-automation

ReproNow

An open source tool to capture screen and network instantly helping security engineers reproduce bugs https://www.repro-now.com/

Scumblr

is a web application that allows performing periodic syncs of data sources (such as Github repositories and URLs) and performing analysis (such as static analysis, dynamic checks, and metadata collection) on the identified results. Scumblr helps you streamline proactive security through an intelligent automation framework to help you identify, track, and resolve security issues faster. https://github.com/Netflix/Scumblr

Providence

is a system for code commit & bug system monitoring. It is deployed within an organization to monitor code commits for security (or other) concerns, via customizable plugins. A plugin performs logic whenever a commit occurs. https://github.com/salesforce/Providence

kube-monkey

is an implementation of Netflix's Chaos Monkey for Kubernetes clusters. It randomly deletes Kubernetes pods in the cluster encouraging and validating the development of failure-resilient services. https://github.com/asobti/kube-monkey

Selenium

Automate security testing through web robots. https://saucelabs.com/blog/discovering-security-vulnerabilities-with-selenium