Skip to content

Beat containing opa sdk to run rego eval on cloud native resources

License

Notifications You must be signed in to change notification settings

uri-weisman/cloudbeat

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Coverage Status Go Report Card Build status

Cloudbeat

Cloudbeat is a tool that analyzes cloud assets for security compliance and sends findings to Elasticsearch. It is designed to be used as part of the Cloud Security plugin in Kibana.

CSP Security Policies

Cloudbeat uses security policies from the Security Policies directory to evaluate cloud resources.

Getting Started

To get started with Cloud Security on your cluster, please refer to our documentation:


Deployment

To run Cloudbeat, you need to have Elastic Stack (Elasticsearch, Kibana, etc) running (locally/cloud). See our Elastic Stack Deployment options documentation.

Once your Elastic Stack is deployed, you can proceed with the deployment of Cloudbeat. For deployment instructions, see Cloudbeat Deployment options.

Development

Prerequisites

We use Hermit to manage our development tooling. Please refer to our README for detailed instructions on setting it up.


Note If you are a developer or contributor, or if you are looking for additional information, please visit our development documentation

About

Beat containing opa sdk to run rego eval on cloud native resources

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Go 52.0%
  • Open Policy Agent 27.2%
  • Python 15.7%
  • Shell 3.0%
  • HCL 1.8%
  • Just 0.3%