AbeWinters / control-mappings
Overview of existing mappings from and to cyber security controls
☆16Updated last year
Alternatives and similar repositories for control-mappings
Users that are interested in control-mappings are comparing it to the libraries listed below
Sorting:
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆39Updated 3 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆18Updated 3 months ago
- A Secure Controls Framework (SCF) Power BI App☆17Updated 6 months ago
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- Security Control Knowledge Graph☆28Updated last year
- This repository is dedicated to providing resources, information, and tools related to the NIS2 Directive, a European Union regulation ai…☆19Updated 3 weeks ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆91Updated 4 years ago
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 4 months ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆17Updated 9 months ago
- ☆19Updated 3 years ago
- NIST CSF Maturity Toolkit☆40Updated 3 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated 2 months ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated last month
- Wazuh integration TheHive☆35Updated 2 years ago
- ☆17Updated 2 years ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 10 months ago
- ☆103Updated this week
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated last month
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆14Updated 4 years ago
- ☆34Updated last year
- NIST 800-53 Baseline Configuration Tool☆11Updated 8 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆127Updated 9 months ago
- WA Cyber Security Unit (DGOV Technical) site☆37Updated last week
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆53Updated last year
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆50Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- Sigma Queries turned into KQL for Defender using pysigma☆9Updated 10 months ago
- ☆15Updated 3 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 7 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆46Updated 2 months ago