AbeWinters / control-mappingsLinks
Overview of existing mappings from and to cyber security controls
☆15Updated last year
Alternatives and similar repositories for control-mappings
Users that are interested in control-mappings are comparing it to the libraries listed below
Sorting:
- A Secure Controls Framework (SCF) Power BI App☆21Updated 7 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆22Updated 4 months ago
- MITRE ATT&CK Based App in Power BI☆16Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆39Updated 3 years ago
- ☆19Updated 3 years ago
- NIST 800-53 Baseline Configuration Tool☆13Updated 9 months ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆17Updated 9 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated 2 months ago
- Personal scripts☆14Updated 8 months ago
- This repository is dedicated to providing resources, information, and tools related to the NIS2 Directive, a European Union regulation ai…☆20Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 11 months ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆93Updated 4 years ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆92Updated 5 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆94Updated last week
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- Security Scripts and Sources for daily usage.☆60Updated 3 weeks ago
- Web based S1 query navigator for one-click threat hunting☆19Updated 4 years ago
- ☆104Updated last week
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Updated 4 years ago
- NIST CSF Maturity Toolkit☆40Updated 3 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆51Updated 4 months ago
- A collection of sources of documentation and best practices to build and run a SOC☆55Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆74Updated 2 months ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆96Updated last week
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆27Updated 9 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated 2 months ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆54Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆46Updated 2 months ago