AbeWinters / control-mappings
Overview of existing mappings from and to cyber security controls
☆14Updated last year
Alternatives and similar repositories for control-mappings:
Users that are interested in control-mappings are comparing it to the libraries listed below
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- A Secure Controls Framework (SCF) Power BI App☆16Updated 4 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆16Updated last month
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆38Updated 3 years ago
- ☆19Updated 3 years ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 8 months ago
- Web based S1 query navigator for one-click threat hunting☆18Updated 4 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆9Updated 9 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆39Updated 11 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆44Updated 2 weeks ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆32Updated last month
- ☆101Updated this week
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 6 months ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆88Updated 2 months ago
- Security Control Knowledge Graph☆28Updated 11 months ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated last week
- ☆87Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆56Updated 3 weeks ago
- ☆42Updated 11 months ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆90Updated 4 years ago
- Security Scripts and Sources for daily usage.☆55Updated 2 weeks ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆52Updated last year
- A collection of various SIEM rules relating to malware family groups.☆65Updated 9 months ago
- This repository is dedicated to providing resources, information, and tools related to the NIS2 Directive, a European Union regulation ai…☆12Updated 5 months ago
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆63Updated 3 weeks ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆27Updated 6 months ago
- NIST 800-53 Baseline Configuration Tool☆9Updated 7 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆125Updated 8 months ago