AbeWinters / control-mappingsLinks
Overview of existing mappings from and to cyber security controls
☆15Updated last year
Alternatives and similar repositories for control-mappings
Users that are interested in control-mappings are comparing it to the libraries listed below
Sorting:
- A Secure Controls Framework (SCF) Power BI App☆21Updated 8 months ago
- Security Control Knowledge Graph☆29Updated last year
- MITRE ATT&CK Based App in Power BI☆16Updated last year
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆97Updated 5 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 5 months ago
- This repository is dedicated to providing resources, information, and tools related to the NIS2 Directive, a European Union regulation ai…☆24Updated 3 months ago
- Useful templates and working document for implementing ISO 27001 - ISMS☆167Updated 2 months ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated 3 weeks ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆42Updated 3 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆67Updated this week
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆15Updated 2 years ago
- NIST 800-53 Baseline Configuration Tool☆13Updated 10 months ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆18Updated 11 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated 3 weeks ago
- NIST CSF Maturity Toolkit☆43Updated last month
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆98Updated last month
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Updated 4 years ago
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 6 months ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about General Data…☆16Updated last year
- Generated a compliance checklist report, asset register and risk register. Implemented policies on various controls of ISO27001:2013 stan…☆29Updated 4 years ago
- Compliance Scorecard OSCAL Policy Standards☆18Updated last year
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆54Updated 2 years ago
- ☆254Updated 6 months ago
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆31Updated 9 years ago
- Web based S1 query navigator for one-click threat hunting☆21Updated 4 years ago
- Wazuh integration TheHive☆38Updated 2 years ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆35Updated 2 weeks ago
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆18Updated last month
- ☆17Updated 2 years ago