Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
-
Updated
Dec 10, 2024 - Go
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Cloud SQL Proxy works with encrypted credential file.
The encryptor work with cloudsql-proxy-hardening.
Add a description, image, and links to the gcp-security topic page so that developers can more easily learn about it.
To associate your repository with the gcp-security topic, visit your repo's landing page and select "manage topics."