subuser alternatives

Looking for an alternative tool to replace subuser? During the review of subuser we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. bane (AppArmor profile generator)
  2. sudo_pair (paired system management with sudo)
  3. Anchore Engine (container analysis and inspection)

These tools are ranked as the best alternatives to subuser.

Alternatives (by score)

60

bane

Introduction

Bane is a tool to create AppArmor profiles. This helps to secure applications by setting restrictions on resources they access or modify. A strict policy may help to prevent privilege escalation attacks.

Project details

bane is written in Golang.

Strengths and weaknesses

  • + More than 500 GitHub stars
  • + The source code of this software is available

    Typical usage

    • Application security
    • Security monitoring
    • System hardening

    bane review

    60

    sudo_pair

    Introduction

    This plugin is useful for companies with strict regulations on access to systems, especially when its a privileged session. It may also be used for allowing a third party access to your systems with strict control and real-time monitoring of the session.

    Project details

    sudo_pair is written in Rust.

    Strengths and weaknesses

    • + The source code of this software is available
    • - No releases on GitHub available

    Typical usage

    • Identity and access management
    • Privileged access

    sudo_pair review

    64

    Anchore Engine

    Introduction

    Anchore is a tool to help with discovering, analyzing and certifying container images. These images can be stored both on-premises or in the cloud. The tooling is mainly focused on developer so that perform analysis on their container images. Typical actions include running queries, creating reports, or set up policies for a continuous integration and deployment pipeline.

    Project details

    Anchore Engine is written in Python.

    Strengths and weaknesses

    • + More than 10 contributors
    • + Commercial support available
    • + More than 1000 GitHub stars
    • + The source code of this software is available

      Typical usage

      • System hardening

      Anchore Engine review

      64

      DFWFW (Docker Firewall Framework)

      Introduction

      DFWFW, short of Docker Firewall Framework, offers easy administration of the iptables rules of Docker containers. It updates using event streams.

      Project details

      DFWFW is written in Perl.

      Strengths and weaknesses

      • + The source code of this software is available
      • - Full name of author is unknown

      Typical usage

      • Firewall management

      DFWFW review

      60

      Dagda

      Introduction

      The main reasons to use Dagda is the detection of vulnerable or malicious components within your containerized environment.

      Project details

      Dagda is written in Python.

      Strengths and weaknesses

      • + The source code of this software is available

        Typical usage

        • Malware detection
        • Malware scanning
        • Vulnerability management
        • Vulnerability scanning

        Dagda review

        60

        Docker Bench (by Aqua)

        Introduction

        Docker Bench is one of the tools that can be used to perform a security analysis on Docker and its configuration. It can find common configuration flaws that may impose risks to other containers or the host itself.

        Project details

        Docker Bench (by Aqua) is written in Golang.

        Strengths and weaknesses

        • + The source code of this software is available
        • - No releases on GitHub available

        Typical usage

        • Configuration audit

        Docker Bench (by Aqua) review

        68

        Docker Bench for Security

        Introduction

        Docker Bench for Security is a small security scanner to perform several tests that are part of the Docker CIS benchmark.

        Project details

        Docker Bench for Security is written in shell script.

        Strengths and weaknesses

        • + More than 25 contributors
        • + Screen output is colored
        • + More than 3000 GitHub stars
        • + The source code of this software is available

          Typical usage

          • Application security
          • Configuration audit
          • Security assessment

          Docker Bench for Security review

          64

          Dockerscan

          Introduction

          Dockerscan is a Docker toolkit for security analysis which includes attacking tools. It is more focused on side of the offensive than defensive.

          Project details

          Dockerscan is written in Python.

          Strengths and weaknesses

          • + More than 500 GitHub stars
          • + The source code of this software is available

            Typical usage

            • Information gathering
            • Security assessment
            • Vulnerability scanning

            Dockerscan review

            100

            Lynis

            Introduction

            Lynis is an open-source security auditing tool that is available since 2007 and created by Michael Boelen. Its primary goal is to evaluate the security defenses of systems running Linux or other flavors of Unix. It provides suggestions to install, configure, or correct any security measures.

            Project details

            Lynis is written in shell script.

            Strengths and weaknesses

            • + The source code is easy to read and understand
            • + More than 100 contributors
            • + More than 8000 GitHub stars
            • + Tool is easy to use
            • + Available as package (simplified installation)
            • + Commercial support available
            • + Used language is shell script
            • + Very low number of dependencies
            • + Project is mature (10+ years)
            • + The source code of this software is available

              Typical usage

              • IT audit
              • Penetration testing
              • Security assessment
              • System hardening
              • Vulnerability scanning

              Lynis review

              Some relevant tool missing as an alternative to subuser? Please contact us with your suggestion.