A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all. A computer security model is implemented through a computer security policy. https://en.wikipedia.org/wiki/Computer_security_model
VPC, Security Groups, IAM and more in the reference architecture. https://access.redhat.com/documentation/en-us/reference_architectures/2017/html/deploying_openshift_container_platform_3.5_on_amazon_web_services/index
Containers make it easy to ensure consistency across environments and multiple deployment targets like physical servers, virtual machines, and private or public clouds. But, enterprises require strong security. This paper describes 10 key elements of security for different layers of the container solution stack and different stages of the container life cycle and how OpenShift delivers those ten elements of container security. https://www.redhat.com/en/resources/container-security-openshift-cloud-devops-whitepaper
is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of modern web applications. http://www.arachni-scanner.com/
for Security Automation https://www.ansible.com/blog/security-automation
An open source tool to capture screen and network instantly helping security engineers reproduce bugs https://www.repro-now.com/
is a web application that allows performing periodic syncs of data sources (such as Github repositories and URLs) and performing analysis (such as static analysis, dynamic checks, and metadata collection) on the identified results. Scumblr helps you streamline proactive security through an intelligent automation framework to help you identify, track, and resolve security issues faster. https://github.com/Netflix/Scumblr
is a system for code commit & bug system monitoring. It is deployed within an organization to monitor code commits for security (or other) concerns, via customizable plugins. A plugin performs logic whenever a commit occurs. https://github.com/salesforce/Providence
is an implementation of Netflix's Chaos Monkey for Kubernetes clusters. It randomly deletes Kubernetes pods in the cluster encouraging and validating the development of failure-resilient services. https://github.com/asobti/kube-monkey
Automate security testing through web robots. https://saucelabs.com/blog/discovering-security-vulnerabilities-with-selenium