AbeWinters / control-mappingsLinks
Overview of existing mappings from and to cyber security controls
☆15Updated last year
Alternatives and similar repositories for control-mappings
Users that are interested in control-mappings are comparing it to the libraries listed below
Sorting:
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆41Updated 3 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 4 months ago
- A Secure Controls Framework (SCF) Power BI App☆21Updated 7 months ago
- MITRE ATT&CK Based App in Power BI☆16Updated last year
- ☆19Updated 3 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 11 months ago
- NIST 800-53 Baseline Configuration Tool☆13Updated 10 months ago
- Security Scripts and Sources for daily usage.☆61Updated 2 weeks ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated this week
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 11 months ago
- Security Control Knowledge Graph☆28Updated last year
- Useful templates and working document for implementing ISO 27001 - ISMS☆165Updated 2 months ago
- NIST CSF Maturity Toolkit☆42Updated 3 weeks ago
- ☆17Updated 2 years ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆95Updated 4 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆18Updated 10 months ago
- This repository is dedicated to providing resources, information, and tools related to the NIS2 Directive, a European Union regulation ai…☆22Updated 2 months ago
- Workflows for Shuffle☆23Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆66Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆63Updated this week
- ☆105Updated last month
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated this week
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆97Updated 3 weeks ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Updated 4 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆52Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆90Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆99Updated 3 weeks ago