A lightweight cryptography-driven Zero Trust protocol to safeguard servers and data from attackers by leveraging resource-hiding and encryption algorithms.
-
Updated
Dec 23, 2024 - Go
A lightweight cryptography-driven Zero Trust protocol to safeguard servers and data from attackers by leveraging resource-hiding and encryption algorithms.
Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
immudb - immutable database based on zero trust, SQL/Key-Value/Document model, tamperproof, data change history
8 Lessons, Kick-start Your Cybersecurity Learning.
Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.
Pomerium is an identity and context-aware access proxy.
Boundary enables identity-based access management for dynamic infrastructure.
🌀 Browse the whole web from a web page. Remote browser isolation. For compliance, integration, security, privacy and more! By https://dosyago.com
The parent project for OpenZiti. Here you will find the executables for a fully zero trust, application embedded, programmable network @openziti
Geo-scale, next-generation peer-to-peer sharing platform built on top of OpenZiti.
LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
Warrant is a highly scalable, centralized authorization service based on Google Zanzibar. Use it to define, enforce, query, and audit application authorization and access control.
Single Packet Authorization > Port Knocking
A curated collection of awesome resources for the zero-trust security model.
Zero Trust Service Access
chai - Experience Zero Trust security with Chai! Convert and view documents as vivid images right in your browser. No mandatory downloads, no hassle—just pure, joyful security! 🌈
The world's most powerful System Activity Monitor Engine · 一款功能强大的终端行为采集防御开发套件 ~ 旨在帮助EDR、零信任、数据安全、审计管控等终端安全软件可以快速实现产品功能, 而不用关心底层驱动的开发、维护和兼容性问题,让其可以专注于业务开发
Manage network policies, AWS, GCP & Azure IAM policies, Istio Authorization Policies, and Kafka ACLs in a Kubernetes cluster with ease.
Add a description, image, and links to the zero-trust topic page so that developers can more easily learn about it.
To associate your repository with the zero-trust topic, visit your repo's landing page and select "manage topics."