subuser alternatives
Looking for an alternative tool to replace subuser? During the review of subuser we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.
Top 3
- bane (AppArmor profile generator)
- sudo_pair (paired system management with sudo)
- Anchore Engine (container analysis and inspection)
These tools are ranked as the best alternatives to subuser.
Alternatives (by score)
bane
Introduction
Bane is a tool to create AppArmor profiles. This helps to secure applications by setting restrictions on resources they access or modify. A strict policy may help to prevent privilege escalation attacks.
Project details
bane is written in Golang.
Strengths and weaknesses
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Application security
- Security monitoring
- System hardening
sudo_pair
Introduction
This plugin is useful for companies with strict regulations on access to systems, especially when its a privileged session. It may also be used for allowing a third party access to your systems with strict control and real-time monitoring of the session.
Project details
sudo_pair is written in Rust.
Strengths and weaknesses
- + The source code of this software is available
- - No releases on GitHub available
Typical usage
- Identity and access management
- Privileged access
Anchore Engine
Introduction
Anchore is a tool to help with discovering, analyzing and certifying container images. These images can be stored both on-premises or in the cloud. The tooling is mainly focused on developer so that perform analysis on their container images. Typical actions include running queries, creating reports, or set up policies for a continuous integration and deployment pipeline.
Project details
Anchore Engine is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + Commercial support available
- + More than 1000 GitHub stars
- + The source code of this software is available
Typical usage
- System hardening
DFWFW (Docker Firewall Framework)
Introduction
DFWFW, short of Docker Firewall Framework, offers easy administration of the iptables rules of Docker containers. It updates using event streams.Project details
DFWFW is written in Perl.
Strengths and weaknesses
- + The source code of this software is available
- - Full name of author is unknown
Typical usage
- Firewall management
Dagda
Introduction
The main reasons to use Dagda is the detection of vulnerable or malicious components within your containerized environment.
Project details
Dagda is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Malware detection
- Malware scanning
- Vulnerability management
- Vulnerability scanning
Docker Bench (by Aqua)
Introduction
Docker Bench is one of the tools that can be used to perform a security analysis on Docker and its configuration. It can find common configuration flaws that may impose risks to other containers or the host itself.
Project details
Docker Bench (by Aqua) is written in Golang.
Strengths and weaknesses
- + The source code of this software is available
- - No releases on GitHub available
Typical usage
- Configuration audit
Docker Bench for Security
Introduction
Docker Bench for Security is a small security scanner to perform several tests that are part of the Docker CIS benchmark.Project details
Docker Bench for Security is written in shell script.
Strengths and weaknesses
- + More than 25 contributors
- + Screen output is colored
- + More than 3000 GitHub stars
- + The source code of this software is available
Typical usage
- Application security
- Configuration audit
- Security assessment
Dockerscan
Introduction
Dockerscan is a Docker toolkit for security analysis which includes attacking tools. It is more focused on side of the offensive than defensive.Project details
Dockerscan is written in Python.
Strengths and weaknesses
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Information gathering
- Security assessment
- Vulnerability scanning
Lynis
Introduction
Lynis is an open-source security auditing tool that is available since 2007 and created by Michael Boelen. Its primary goal is to evaluate the security defenses of systems running Linux or other flavors of Unix. It provides suggestions to install, configure, or correct any security measures.
Project details
Lynis is written in shell script.
Strengths and weaknesses
- + The source code is easy to read and understand
- + More than 100 contributors
- + More than 8000 GitHub stars
- + Tool is easy to use
- + Available as package (simplified installation)
- + Commercial support available
- + Used language is shell script
- + Very low number of dependencies
- + Project is mature (10+ years)
- + The source code of this software is available
Typical usage
- IT audit
- Penetration testing
- Security assessment
- System hardening
- Vulnerability scanning
Some relevant tool missing as an alternative to subuser? Please contact us with your suggestion.