0xdefendA / policies
Open source information security policies
☆15Updated 4 years ago
Alternatives and similar repositories for policies:
Users that are interested in policies are comparing it to the libraries listed below
- Questions to ask about the team and company when you're interviewing for a CISO position☆12Updated 3 years ago
- Vendor Security Model Contract☆98Updated 2 years ago
- ☆70Updated 7 months ago
- Remote Memory Acquisition Tool☆245Updated 4 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated 2 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆179Updated 7 months ago
- KPN Security Policy☆146Updated 4 years ago
- read the docs version of risk management☆24Updated 2 years ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Updated 5 months ago
- ☆44Updated 2 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- Utilities for programmatic analysis of Cartography data.☆35Updated last year
- Factor Analysis of Information Risk (FAIR) tool developed in R☆20Updated 7 years ago
- Cloud security tutorials and best practices☆38Updated 2 years ago
- Updated incident response generator for training classes☆43Updated 3 years ago
- ☆63Updated 2 years ago
- ☆82Updated 5 years ago
- OpenControl-formatted industry standards and requirement documents☆45Updated last year
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆313Updated 9 months ago
- Open source security career ladders☆115Updated 2 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- Osquery Mangement Server☆113Updated 4 years ago
- A production-friendly malware scanner for your AWS cloud☆199Updated 3 years ago
- The SOCless automation framework☆139Updated last month
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 5 months ago
- Boilerplate Incident Response Plan from "Starting Up Security"☆162Updated 4 years ago
- A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems☆56Updated last year
- Documentation on the Cyber Defense Matrix☆24Updated last year