AbeWinters / control-mappings
Overview of existing mappings from and to cyber security controls
☆15Updated last year
Alternatives and similar repositories for control-mappings:
Users that are interested in control-mappings are comparing it to the libraries listed below
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆38Updated 3 years ago
- A Secure Controls Framework (SCF) Power BI App☆16Updated 5 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆17Updated 2 months ago
- This repository is dedicated to providing resources, information, and tools related to the NIS2 Directive, a European Union regulation ai…☆16Updated last week
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- Security Control Knowledge Graph☆28Updated last year
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 3 months ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆17Updated 8 months ago
- NIST CSF Maturity Toolkit☆37Updated 2 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated last month
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated last month
- Run individual controls or full compliance benchmarks for CIS across all of your Microsoft 365 and Office 365 tenants using Powerpipe and…☆25Updated 2 months ago
- ☆19Updated 3 years ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 9 months ago
- AI-Powered Dark Web OSINT Tool☆36Updated this week
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆58Updated last week
- ☆10Updated 4 months ago
- Wazuh integration TheHive☆35Updated 2 years ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆91Updated 4 years ago
- Useful templates and working document for implementing ISO 27001 - ISMS☆144Updated 3 weeks ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 7 months ago
- NIST 800-53 Baseline Configuration Tool☆10Updated 8 months ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- OWASP Foundation Web Respository☆49Updated this week
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆39Updated last month
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated last year
- Generated a compliance checklist report, asset register and risk register. Implemented policies on various controls of ISO27001:2013 stan…☆29Updated 3 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆76Updated 2 weeks ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆27Updated 7 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated last month